US5889941A - System and apparatus for smart card personalization - Google Patents

System and apparatus for smart card personalization Download PDF

Info

Publication number
US5889941A
US5889941A US08/755,459 US75545996A US5889941A US 5889941 A US5889941 A US 5889941A US 75545996 A US75545996 A US 75545996A US 5889941 A US5889941 A US 5889941A
Authority
US
United States
Prior art keywords
data
card
personalization
equipment
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/755,459
Inventor
David R. Tushie
William W. Haeuser
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Card Tech Corp
Original Assignee
UBIQ Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
US case filed in Minnesota District Court litigation Critical https://portal.unifiedpatents.com/litigation/Minnesota%20District%20Court/case/0%3A05-cv-02546 Source: District Court Jurisdiction: Minnesota District Court "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
First worldwide family litigation filed litigation https://patents.darts-ip.com/?family=26687742&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US5889941(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by UBIQ Inc filed Critical UBIQ Inc
Priority to US08/755,459 priority Critical patent/US5889941A/en
Assigned to UBIQ INC. reassignment UBIQ INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HAEUSER, WILLIAM W., TUSHIE, DAVID R.
Priority to NZ332406A priority patent/NZ332406A/en
Priority to BR9708673-8A priority patent/BR9708673A/en
Priority to CA002251689A priority patent/CA2251689C/en
Priority to JP9537290A priority patent/JP2000508794A/en
Priority to AT03075844T priority patent/ATE341052T1/en
Priority to PT97921189T priority patent/PT894312E/en
Priority to EP03075844A priority patent/EP1333408B1/en
Priority to DE69736752T priority patent/DE69736752T2/en
Priority to PT03075844T priority patent/PT1333408E/en
Priority to CNB97195304XA priority patent/CN1187709C/en
Priority to DE69720201T priority patent/DE69720201T2/en
Priority to DK97921189T priority patent/DK0894312T3/en
Priority to ES03075844T priority patent/ES2272885T3/en
Priority to IL12658397A priority patent/IL126583A/en
Priority to AT97921189T priority patent/ATE235719T1/en
Priority to AU27298/97A priority patent/AU717870B2/en
Priority to EP06020123A priority patent/EP1762988A1/en
Priority to EP97921189A priority patent/EP0894312B1/en
Priority to PCT/US1997/006204 priority patent/WO1997039424A1/en
Priority to ES97921189T priority patent/ES2195139T3/en
Priority to DK03075844T priority patent/DK1333408T3/en
Priority to US09/126,363 priority patent/US6202155B1/en
Priority to US09/139,163 priority patent/US6014748A/en
Priority to NO19984821A priority patent/NO330751B1/en
Application granted granted Critical
Publication of US5889941A publication Critical patent/US5889941A/en
Priority to US09/416,252 priority patent/US8301300B2/en
Priority to HK00100192A priority patent/HK1021424A1/en
Priority to JP2005243309A priority patent/JP2006072998A/en
Assigned to NBS UBIQ INC. reassignment NBS UBIQ INC. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: UBIQ INCORPORATED
Assigned to CARD TECHNOLOGY CORPORATION reassignment CARD TECHNOLOGY CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NBS UBIQ INC.
Priority to US11/626,219 priority patent/US20070118474A1/en
Priority to JP2009272710A priority patent/JP2010049711A/en
Priority to US12/987,875 priority patent/US20110166999A1/en
Assigned to DATACARD CORPORATION reassignment DATACARD CORPORATION LICENSE (SEE DOCUMENT FOR DETAILS). Assignors: CARD TECHNOLOGY CORPORATION, NBS TECHNOLOGIES (US), INC., NBS TECHNOLOGIES, INC.
Assigned to DATACARD CORPORATION reassignment DATACARD CORPORATION SECURITY AGREEMENT Assignors: CARD TECHNOLOGY CORPORATION, NBS TECHNOLOGIES (US), INC., NBS TECHNOLOGIES, INC.
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Definitions

  • the present invention is related to data storage devices and in particular to producing portable programmed data carriers such as credit cards, debit cards, identification cards, and other transaction cards.
  • Transaction cards with embedded chips are referred to in the industry as portable programmed data carriers, more commonly called “smart cards.”
  • the chip in a smart card is programmed with initialization and/or personalization data at the same time as the surface of the card is being embossed and/or printed.
  • the initialization data comprises three major types of information: application data, security data, and printed data.
  • the application data is common to all cards for a given card application and includes application program code and variables.
  • the security data prevents fraudulent use of the card and is usually provided in the form of "secure keys.”
  • Printed data such as a logo, bar codes, and various types of numerical information, are placed on the surface of the card. Some or all of the same data can also be embossed on the surface. Optical technology also can be employed to make part or all of the surface of the card into a storage medium with data accessible by an appropriate optical reader.
  • Smart cards are also programmed with information specific to an individual card holder through a process called "personalization.”
  • the personalization information for a smart card is similar to the personalization information currently contained on non-smart cards, such as the card holder's name, account number, card expiration date, and a photograph. Because of its increased storage capacity, the chip in a smart card can contain additional data beyond the basic information on the standard transaction card including a graphical representation of the individual's signature, data defining the types of service the card holder is entitled to, and account limits for those services.
  • the smart card issuing process must control and report on each personalized card and the results of the personalization process. Extensive report and audit files thus must be maintained to support the card tracking requirements.
  • a smart card issuing system must be tailored to meet the requirements of a specific card application that will be programmed on a specific type of smart card under the control of a specific card operating system and to format the data for the card to be compatible with a specific type of personalization equipment chosen to issue the card.
  • the entire issuing system must be re-configured whenever any one of these variables (issuer application, smart card/card operating system, and/or personalization equipment) is changed, increasing the time and cost incurred by the issuer of the card in delivering personalized smart cards to its customers.
  • many of the current issuing systems lack a viable means to provide dynamic feedback regarding the status of any particular batch of cards in the process to the card issuer.
  • the smart card issuing systems in use today utilize a proprietary approach developed by either the card manufacturer or the personalization equipment manufacturer.
  • each manufacturer develops a unique personalization solution for a particular card application, and each solution is specific to a particular card issuer.
  • These unique solutions are intended to optimize performance of the cards or equipment and thus do not permit a more inclusive, generalized personalization process that accepts any card operating system and/or work with any personalization equipment.
  • a smart card issuing system which permits the card issuers to use any type of personalization equipment to handle multiple types of smart cards, and their attendant operating systems, and to embed the issuers' specific card applications along with the required card holder data in any of the various types of smart cards is required.
  • a smart card personalization system maintains a database containing card application data, issuer format template data, card operating system data, and personalization equipment data to permit a card issuer to dynamically change card applications, card and card operating systems, and/or personalization equipment in a card issuing process without the necessity of modifying the card issuer's interface to the issuing process.
  • the smart card personalization system issues portable programmed data carriers, or smart cards, by first acquiring a data format identifier, a card operating system identifier, a personalization equipment identifier, an application program identifier or identifiers, and personalization data for a card holder from a card issuer management system.
  • the identifiers permit the system to address data stored in a data structure, such as a database, and specify the particular data needed by the system for each card to be issued. Because each card issuer formats its personalization data differently and may have multiple data formats, the smart card personalization system has a database of data format templates that enable it to interface with multiple card issuer management systems.
  • the system acquires the format template defining the personalization data used by a particular card issuer from a record in the database identified by the data format identifier.
  • the system uses the data format template to translate the personalization data from the card issuer's format into an internal format recognized by the components of the system.
  • the system uses the card operating system identifier and application program identifier(s) to acquire programming control commands for an operating system pre-loaded in a microprocessor chip embedded in the card, and application data, in the form of code and/or variables, for an application program type or types from the database.
  • the system also acquires the equipment characteristic data for the personalization equipment to be used to issue the smart card using the personalization equipment identifier. Once the system has acquired all the data necessary to issue the smart card it transfers the programming control commands, the application code and variables, and the translated personalization data to the personalization equipment as specified by the equipment characteristic data.
  • no data format identifier is passed by the card issuer because the data format template is derived from data in the application data record or because the format of the personalization corresponds on a one-to-one basis with the internal format used by the system.
  • the card issuer may also substitute the data format template record for the data format identifier so the system does not need to reference its database of format records.
  • the smart card personalization system collects information regarding the card issuing process and reports this information to the card issuer management system.
  • Smart cards may include one or more "secure keys" that are programmed into the chip to prevent fraudulent use of the card.
  • the appropriate secure key data is obtained by the smart card personalization system from secure key records maintained by the card issuer, or another security source, and then transferred to the personalization equipment.
  • the security source also provides security functions that are used by the smart card personalization system to ensure the integrity and secrecy of data during the transmission of data to and from the system and within the system during the smart card personalization process.
  • the smart card management system performs the functions described above through a series of software modules executing on a computer or multiple computers.
  • One module is a card issuer management system interface which acquires the data format identifier, the card operating system identifier, the personalization equipment identifier, the application program identifier(s), and the personalization data for a card holder from the card issuer management system.
  • the card issuer management system interface uses the data format identifier to acquire the format template that defines the personalization data and translates the personalization data into the common, internal data format.
  • a card operating system interface module acquires the programming control commands for the card operating system type specified by the card operating system identifier.
  • a card application interface module uses the application program identifier(s) to determine which type(s) of application program is to be placed on the card and acquires the specified application code and variables.
  • a personalization equipment interface module is responsible for the acquisition of the equipment characteristic data for the personalization equipment type specified by the personalization equipment identifier, and further for transferring the programming control commands, the application code and variables, and the translated personalization data to the personalization equipment in accordance with the requirements stipulated by the equipment characteristic data.
  • the reporting and security functions are provided by a tracking/report module and by a secure key management module.
  • the smart card personalization system uses an underlying data structure, such as a database, residing in a computer storage medium to organize the data necessary to issue the smart cards.
  • the data structure comprises several different types of data elements and uses "indices" or "identifiers" to quickly access specific data.
  • the data format element contains a template that defines the format of the personalization data used the card issuer.
  • the data format element may be stored in a database containing data format elements for various card issuer and the information stored in the data format element is accessed through the data format identifier.
  • the data format element may be derived at the time the card is issued from data in the application program element(s) so that the application program identifier(s) passed by the card issuer identify the data format.
  • the data format template is logically implied which creates a virtual data format element for the issuing process.
  • the card operating system element holds the programming control commands that direct the card operating systems controlling a smart card chip and is accessed through the card operating system identifier.
  • the application program element(s) contains application data, such as program code and variables, required by the applications associated with various card issuers; application data is accessed through an application program identifier(s).
  • Operating parameters for various types of personalization equipment used to issue smart cards are stored in the personalization equipment element and accessed through a personalization equipment identifier corresponding to the type of the personalization equipment to be used during an issuing run.
  • the smart card personalization system addresses the weakness in the prior art by providing a centralized interface of inputs and outputs to the smart card personalization process which is designed to dynamically accommodate changes in the issuing process.
  • the system interfaces to any issuer management system, manages the transfer of card holder data and card applications to the particular personalization equipment used, and collects statistics for real-time and off-line inquiries to support critical management and reporting functions.
  • the system maintains a database of issuer data formats, card operating systems, card application programs, and types of personalization equipment. This database enables the system to handle any combination or permutations of the data, thus improving cost and time to market for the issuer.
  • the system interfaces with various card security methodologies to reduce fraud.
  • FIG. 1A is a block diagram representing a smart card issuing process that incorporates a smart card personalization system.
  • FIG. 1B is a functional block diagram of input and output connections for the smart card personalization system shown in FIG. 1A.
  • FIG. 1C is a functional block diagram showing software modules and data structures which comprise one embodiment of the smart card personalization system shown in FIG. 1B.
  • FIG. 2 is the functional block diagram of the embodiment of FIG. 1C with the addition of a security module to manage keys used for smart cards.
  • FIG. 3 is a functional block diagram of another embodiment of the smart card personalization system showing a minimal configuration to manage multiple types of cards and personalization equipment.
  • FIG. 4 is the functional block diagram of the embodiment of FIG. 3 with the addition of a module to manage multiple card operating systems.
  • FIG. 5 is the functional block diagram of the embodiment of FIG. 4 with the addition of the security module.
  • FIG. 6 is the functional block diagram of the embodiment of FIG. 3 with the addition of a module to manage multiple card applications.
  • FIG. 7 is the functional block diagram of the embodiment of FIG. 6 with the addition of the security module.
  • FIGS. 8A, B represent a high level flow chart for computer software which implements the functions of the smart card personalization system.
  • FIG. 9 is a functional block diagram of an alternate embodiment of the smart card personalization system using software modules and data records.
  • FIGS. 10A, B represent a high level flow chart for computer software which implements the functions of the embodiment of the smart card personalization system shown in FIG. 9.
  • FIG. 11 is a data field chart for a card framework template record used by the embodiment of the smart card personalization system shown in FIG. 9.
  • FIG. 12 is a data field chart for a data format template record used by the embodiment of the smart card personalization system shown in FIG. 9.
  • FIG. 13 is a data field chart for a card application data record used by the embodiment of the smart card personalization system shown in FIG. 9.
  • FIGS. 14, 14A, 14B represent a report format showing sample items tracked by the smart card personalization system.
  • Standard transaction cards such as regular credit cards are familiar to most people.
  • a transaction card usually has information about the card holder, such as name and account number, printed and/or embossed on the surface of the card.
  • Transaction cards frequently contain a magnetic stripe which is encoded with card holder data as well.
  • the process of printing/embossing/encoding the card holder data on each transaction card is known as "personalization.”
  • Each transaction card also undergoes a process known as "initialization” in which certain types of information common to all cards in a batch, such as an issuer identifier and batch number, are placed on the card.
  • a smart card differs from a standard transaction card in that a computer microprocessor chip is embedded in the plastic of the card to greatly increase the card's data storage capacity.
  • the card manufacturer pre-loads the chip with one of several possible card operating systems and the operating system controls the programming of the chip during the personalization process. Additionally, sophisticated card applications specific to the card issuer may execute in certain varieties of the chips.
  • the initialization data for a smart card comprises three major types of information: application data, security data, and printed data.
  • the application data is common to all cards for a given card application and includes application program code and variables that are programmed into the chip.
  • the security data usually provided as secure keys or security functions, validates the data on the card and prevents fraudulent use of the card.
  • Printed data such as a logo, bar codes, and various types of numerical information, are printed on the surface of the card. Some or all of the same data may also be embossed on the surface.
  • Optical technology also may be employed to make part of the surface of the smart card into a storage medium with data accessible by an appropriate optical reader.
  • the personalization information for a smart card is similar to the personalization information currently contained on non-smart cards, such as the card holder's name, account number, card expiration date, and a photograph. Because of its increased storage capacity, the chip in a smart card may contain additional data beyond the basic information on the standard transaction card including a graphical representation of the individual's signature, data defining the types of service the card holder is entitled to, and account limits for those services.
  • FIG. 1A shows components of a smart card issuing process that incorporates an embodiment of the smart card personalization system of the present invention.
  • the smart card personalization system 100 receives data from a card issuer management system 150 (typically proprietary to the card issuer), translates the data into a data stream, and outputs the data stream to personalization equipment 130 which personalizes the smart cards 160.
  • the card issuer management system 150 manages the card holder data and determines the type of card to issue, the card applications to embed in the card, and what personalization equipment to use to issue the card for a particular card holder.
  • the card issuer management system is frequently a computer program as illustrated in FIG. 1A, but the smart card personalization system 100 is capable of receiving data from alternate inputs, such as a person inputting the data from a telephone keypad.
  • the smart card personalization system 100 is illustrated in FIG. 1A as a software program executing in a computer. As described below, the smart card personalization system 100 accesses database records which define various types of cards and card operating systems, card applications, and personalization equipment.
  • the logical functions of the software and the database may be distributed among computers in a client/server network or centralized into a single processor. The functions may also be distributed across processors connected through standard local area networks, wide area networks, dedicated phone lines or other communication means used to loosely couple processors.
  • the software program executes under an operating system such as Unix, Windows 95 ⁇ , or Windows NT ⁇ , and on industry-standard workstation and/or personal computer hardware.
  • the system 100 controls card printers, embossing devices, and integrated or add-on smart card interface devices collectively represented in FIG. 1A as personalization system 130.
  • Personalization equipment 130 also represents such devices as large volume card printer/embossers, small volume card printer/embossers, automatic teller machiners (ATMs), point of sale terminals, unattended kiosks, personal computers, network computers, and on-line telecommunication devices.
  • ATMs automatic teller machiners
  • the computer system executing the smart card personalization system 100 may be physically connected to both devices or to only one of the devices.
  • the host controls the directly-connected device and has a logical connection to the other.
  • the physical connection between the devices and the host varies according to the manufacturer and model of the device. Common industry standard connections include serial RS232, SCSI (Small Computer System Interface), Ethernet, and serial TTL (Transistor-Transistor Logic).
  • serial RS232 Serial RS232
  • SCSI Small Computer System Interface
  • Ethernet Ethernet
  • serial TTL Transistor-Transistor Logic
  • connections between the smart card personalization system 100 and the card management system 150 and the devices 130 may also be implemented through standard local area networks, wide area networks, dedicated phone lines, or other remote communication infrastructure used to transfer data.
  • the use of such remote connections when personalizing smart cards is described in U.S. Pat. No. 5,524,857 issued on Jul. 9, 1996, to Laing, et al. Alternate connections will be apparent to those skilled in the art and are within the scope of the invention.
  • FIG. 1B is a block diagram of one embodiment of the smart card personalization system illustrating the logical connections between the smart card personalization system 100 and functions employed by a card issuing organization to issue smart cards.
  • Card holder data maintained by the card issuing organization contains information about each individual card holder, such as name, account number, card expiration date, and applicable services.
  • Various ways of inputting the card holder data into the card issuer management system 150 are shown in phantom as card holder data 152 in FIG. 1B.
  • the card issuer management system 150 may receive the card holder data on computer media, such as magnetic tape, floppy disk, or CD ROM.
  • the card holder data 152 may be input through an on-line connection such as a general switched telephone network, a packet-switched network, i.e., the Internet, a dedicated line, or a cable/satellite television signal. Additional ways in which the card holder data 152 may be input to the system 150 will be apparent to those skilled in the art.
  • an on-line connection such as a general switched telephone network, a packet-switched network, i.e., the Internet, a dedicated line, or a cable/satellite television signal. Additional ways in which the card holder data 152 may be input to the system 150 will be apparent to those skilled in the art.
  • the card issuer typically has an existing reporting capability 154 with which the smart card personalization system 100 interfaces so that the card issuer can review statistical information maintained by the system 100.
  • An external security source also provided by the card issuer and shown as secure key manager 111 and secure key database 128, provides security functions that work in conjunction with the card issuer management system 150 and the smart card personalization system 100.
  • FIG. 1B also illustrates an alternate embodiment of the smart card personalization system 100 which supports a card issuer that has add-on smart card interface devices. The system 100 directs a portion of the personalization information to the older personalization equipment 130 and the remainder of the data to a post-processor 132 in the smart card interface device 132 which programs the chip. These functions are explained in detail below.
  • the embodiments of the software program for the smart card personalization system 100 shown in the following Figures function as combinations of code modules with each module executing a specific part of the issuing process.
  • the modules are coupled through defined input and output program calls, and are also coupled to the data structures through standard data query commands that provide access to the data stored in the data structures.
  • the communication protocols between the modules, and between the modules and the data structures vary depending on the language in which the modules are written and upon the underlying data management system employed to support the database.
  • FIG. 1C is a more detailed functional block diagram of the smart card personalization system 100 of FIG. 1 B without the external security functions.
  • FIG. 1C shows the internal connections between software modules and database records that enable the smart card personalization system 100 to combine multiple types of issuer data formats, card operating systems, card applications and personalization equipment when issuing smart cards.
  • the smart card personalization system 100 provides a customized card issuer management interface 101 to a card issuer management system 150.
  • the card issuer management system 150 passes personalization data from a card holder database 152 to the system 100.
  • Each software module within system 100 expects the personalization data to be passed to it in a particular, internal format.
  • the personalization data is in an external format defined by the card issuer that often differs from the internal format(s) expected by the software modules, the personalization data is translated by the system 100 into the internal format(s) using the data format template.
  • the system 100 may acquire the data format template through a data format identifier passed by the card issuer that the system 100 uses to acquire an optional data format template record 120 (shown in phantom in FIG.
  • the card issuer passes the data format template record to the system 100 instead of the data format identifier.
  • the data format template may be derived from the data in the card application record 124 that is specified by an application program identifier passed by the issuer as illustrated by an optional connection between the card application database 124 and the card issuer management system interface 101.
  • security functions are provided internal to the smart card personalization system 100, by passing security functions into the system as part of the card application record.
  • FIG. 1C A further alternate embodiment in which the personalization data format matches the internal format is also shown in FIG. 1C. Because no translation between the external and internal formats is necessary in this embodiment, no data format template is needed so the data format record 120 and the connections between the card issuer management system interface 101 and the data format record 120 and the card application database 124 are not present.
  • the data format record may 120 be composed of a plurality of tables which instruct the system 100 as to the proper parsing of the personalization data or a simple list that indicates the order in which the fields of the card holder data record appear as will be apparent to those skilled in the art.
  • the various alternate procedures for determining the format of the personalization data described above are implicit in all the embodiments of the smart card personalization system 100 described herein.
  • a card operating system interface module 103 retrieves programming control commands specific to the card operating system 122 for the microprocessor chip that is embedded in the type of card being issued.
  • the programming control commands direct the encoding of the chip with the personalization data and the card application(s) chosen by the card issuer.
  • Each card application comprises program code and variable data that is stored in the database as application data 124 and is identified by an application program identifier.
  • the card issuer management system 150 passes one or more program application identifiers to the system 100 which are used by a card application interface module 105 to acquire the corresponding application data 124.
  • the personalization equipment that the card issuer plans to use to issue the batch of cards is defined by a personalization equipment identifier.
  • a personalization equipment interface module 107 acquires equipment characteristic data 126 specific to the type of personalization equipment 130 corresponding to the personalization equipment identifier.
  • the personalization equipment interface 107 also acquires the programming control commands, the application code and variables, and the translated personalization data, and transfers all of this data to the personalization equipment 130 as specified by the equipment characteristic data 126 to issue the smart card.
  • An alternate embodiment of the system 100 supports a card issuer that has augmented their existing personalization equipment with a smart card programming device by having the personalization equipment interface 107 direct a subset of the translated personalization information to the older personalization equipment 130 and the remainder of the data to a post-processor 132 in the smart card programming device.
  • the smart card personalization system 100 also provides a tracking/report module, or engine, 109 that collects statistical information from the other modules in the system 100 and formats the statistical information for output as hard-copy reports 154 or as input to a reporting function in the card issuer management system 150. Because this statistical information is being gathered in real-time, the card issuer management system 150 can interactively query tracking/report module 109 to obtain statistics about the smart card personalization system as it is executing. Examples of items monitored by the tracking/report module 109 are shown in FIG. 14.
  • the smart card personalization system 100 includes a security source in the form of a secure key manager module 111 and secure key database 128.
  • the vendor includes security architecture on the chip to prevent unauthorized programming.
  • the security architecture implementation is commonly dependent on the application(s) programmed onto the chip. For example, the secure keys programmed in a stored value application would be different than the secure keys programmed in a health care application.
  • the security architecture implementation also varies depending on the type of card: some cards require a single secure key which enables chip programming while others require multiple secure keys to enable chip programming and to perform additional security functions.
  • FIG. 2 illustrates the basic functions of the secure key manager 111 when interfacing with the security architecture on a card that requires multiple secure keys.
  • the secure key data is stored in the secure key database 128 which is external to the smart card personalization system 100 and maintained by the card issuer or other security source. Extending the secure key manager 111 to handle more or fewer secure keys, and to interface with a secure key database managed by the smart card personalization system 100 itself, is dependant on the application, operating system, and personalization equipment being used in the specific card issuing application, and will be apparent to those skilled in the art.
  • the secure key manager 111 also provides additional mechanisms to ensure secure key data authentication, data integrity and data secrecy.
  • secure key data authentication is accomplished through the implementation of various encryption methods.
  • Secure key data integrity is achieved through digital signature mechanisms that use public keys to ensure that secure key data is being transmitted and received from valid sources.
  • Secure key data secrecy is ensured by encrypting the transmitted data with a private key that is shared with the data receiver and which the data receiver uses to decrypt the data upon receipt.
  • the secure key manager 111 After the system 100 receives a secure key record from the secure key database 128, the secure key manager 111, in conjunction with the card operating system interface 103 and the card application interface 105, perform the secure key authentication, data integrity and data secrecy functions. The system 100 then transfers the secure key data to the personalization equipment 130 through the personalization equipment interface 107 along with the other data for the card.
  • the secure key manager 111 passes security information to the other modules of the smart card personalization system 100.
  • portions of the card holder data such as the PIN (Personal Identification Number) code, may be encrypted by the card issuer management system 150 prior to passing the data to the smart card personalization system 100.
  • the card issuer management system interface 101 retrieves the encryption key from the secure key database 128 through the secure key manager 111, and decrypts the data prior to encoding or programming the PIN code into the magnetic stripe and/or the chip.
  • the secure key manager 111 is a code "hook" into the smart card personalization system 100 which provides a gateway connection for an external security source that supplies the required security functions.
  • an external security source is a security manager program written by a third party that manages a security database of secure keys and/or security functions similar to secure key database 128.
  • the security functions may be either external routines executed by the security manager, or code modules passed by the security manager which are then executed by the smart card personalization system 100 to provide the required security functions, or a combination of both.
  • FIG. 3 illustrates a minimal configuration of the smart card personalization system 100.
  • the card issuer management system interface modules 101 and the personalization equipment interface modules 107 are enabled in the software.
  • This embodiment permits card issuer to use the system 100 to personalize non-smart cards, thus saving the cost of having two separate personalization systems, while permitting the card issuer to use multiple data formats and multiple types of personalization equipment.
  • FIG. 3 also illustrates an additional alternate embodiment that includes the tracking/report module 109 as described above in conjunction with FIG. 1C.
  • the smart card personalization system 100 shown in FIG. 3 encodes data onto an optical transaction card when optical-encoding equipment is used as the personalization equipment 130.
  • FIGS. 4 and 5 depict still further alternate embodiments that are implemented when the card issuer does not program a card application on the smart card chip. These embodiments allow the card issuer to issue multiple card types with their attendant variety of operating systems on multiple types of personalization equipment without having to reconfigure the smart card personalization system 100.
  • FIG. 4 includes the modules that support reporting and post-processing.
  • FIG. 5 illustrates the embodiments of FIG. 4 with the addition of the secure key manager module 111 that provides security to the card operating system interface 103 for transmission to the personalization equipment 130.
  • FIGS. 6 and 7 illustrate embodiments to support a card issuer that uses the chip on a smart card only as a data storage device for a card application, and so does not have an operating system executing on the chip.
  • Smart card personalization system 100 supports multiple card applications for multiple card types issued with multiple types of personalization equipment.
  • FIGS. 6 and 7 are analogous to FIGS. 4 and 5 except that the secure key manager 111 provides secure keys and/or functions to the card application interface 105 instead of the card operating system interface 103.
  • FIG. 8 is a high level flow chart for one embodiment of software which implements the functions of the smart card personalization system 100 described above.
  • the software acquires a personalization equipment identifier for a batch of transaction cards to be issued from the card issuer management system at block 801. Depending on the type of cards to be issued, the software also acquires a program application identifier(s) and/or a card operating system identifier at the same time.
  • the software acquires the particular data format template corresponding to the format of the personalization data through one of the procedures described above (block 803).
  • the system acquires the equipment characteristics for the personalization equipment to be used to issue the batch of cards from the personalization equipment record specified by the personalization equipment identifier.
  • Block 807 the software retrieves the programming control commands from the card operating system database record corresponding to the card operating system identifier at block 809.
  • Blocks 811 and 813 perform the same logic for a card application, retrieving the application data, such as code and/or variables, from the database.
  • the software has acquired the common data necessary for all the cards in the batch and begins looping through the logic which issues cards for the individual cardholders.
  • the card issuer management system passes the personalization data for a single card holder to the software (block 815) which translates the data items from the format defined by the data format template into an internal format used by the modules of the smart card personalization system (block 817). If the card chip contains security architecture that requires secure keys (block 819), the software acquires the secure key data necessary to perform the secure key functions from the appropriate secure key source at block 821.
  • the software is now ready to transfer data to the personalization equipment to program the card. If the card is protected by secure keys, the secure key functions are performed and the secure key data is transferred at block 823. Then the programming control codes for the chip operating system, if applicable, are transferred (blocks 825 and 827); next the application code and/or variables are transferred if they are needed (blocks 829 and 831). Finally, the card holder's personalization data that was translated into the internal format is transferred (block 833).
  • the software After the data has been transferred to the card, the software adds the appropriate values to the statistics it collects for the card issuer management system at block 839. If more cards in the same batch remain to be issued (block 841), the software returns to block 815 and acquires the personalization data for the next card holder. Otherwise, the software determines if the card issuer management system has a different batch of cards to issue (block 843) and returns to block 801 to acquire the necessary information to repeat the cycle for the new batch. If no further cards are to be issued, the software exits.
  • the mechanisms by which the card issuer management system 150 passes the necessary data to the smart card personalization system 100 and the order in which the smart card personalization system processes the data from the card issuer management system may be changed without exceeding the scope of the invention. Different arrangements are dictated by the specific environment in which the system 100 operates as shown in the alternate embodiment illustrated in FIGS. 9 and 10.
  • a security module 911 acts as a gateway into the smart card personalization system 100 for a security source such as security manager 940 and security database 942 shown in FIG. 1B as 111 and 128 respectively.
  • the security manager 940 controls access to the security database 942 and connects into the security gateway 911 to perform the necessary security functions for the smart card personalization system 100.
  • the security gateway 911 is coupled to the card issuer management system interface 901 which allows the interface 901 to request that the security manager 940 decrypt personalization data passed in an encryption format by the card issuer management system 950.
  • the security gateway 911 is also coupled to the card application interface 903 and the card operating interface 905 so that it can supply the necessary secure keys and/or security functions to those interfaces as explained above in conjunction with FIG. 2.
  • the embodiment of the smart card personalization system 100 shown in FIG. 9 acquires the application data 922 specified by the application program identifier prior to acquiring the programming control commands specific to the card operating system 924 using the card identifier.
  • This embodiment permits the personalization data and the application data to be translated into the internal format prior to retrieving the programming commands for the card operating system 924 and the equipment characteristic data 926, thus speeding the processing of each smart card.
  • Standard transaction cards have data printed and embossed on the surface of the card and/or data encoded in a magnetic stripe on the card.
  • data may also be stored in an internal memory area within the microprocessor. The same data may be placed on the surface of the card, in the magnetic stripe and also in the chip memory. The exact configuration of the data in and on the card will vary depending on the type of smart card being issued and the requirements of the card issuer.
  • FIG. 10 is a high level flow chart of the embodiment shown in FIG. 9 and, in conjunction with FIGS. 11, 12 and 13, further illustrates how different mechanisms may be used to implement the smart card personalization system 100.
  • the card issuer management system 950 passes a card framework template that defines the configuration of the smart card to the smart card personalization system 100 at block 1001.
  • FIG. 11 illustrates one embodiment of the data layout for the card framework template record 1100.
  • the microprocessor chip identifier 101 and the card operating system identifier 1102 are specific to the type of smart card to be issued.
  • the master file definition 1103 contains control information such as the chip source and the last date the chip was altered.
  • the system file definitions 1104, 1105, 1107 contain addresses for the location of the system files within the memory of the chip.
  • the system files are used by the card operating system and contain information such as the PIN code(s) for the card and applications, and algorithm tables.
  • the master file and the system file definitions conform to the International Standards Organization (ISO) directive number 7816-4.
  • the next three sections of the card framework template record 1100 define the arrangement of data on the surface and magnetic stripe of the card. If information is to be printed on the card, such as the card holder's photograph 1109, the location on the surface of the card to print such data is passed by the card issuer management system 950 in the printing template of the card framework template record 1100. Similarly, the locations on the surface of the card to emboss data is passed in the emboss template, and the arrangement of the data to be encoded in the magnetic stripe is passed in the mag stripe template.
  • the emboss data is illustrated in the card framework template record 1100 as the card holder's name (EMName) 1111, account number (EMAcct) 1113, and expiration date (EMXdat) 1115 and the magnetic stripe data by the account number (MSAcct) 1117 and the expiration date (MSXdat) 1119.
  • EName card holder's name
  • EMAcct account number
  • EMXdat expiration date
  • MSAcct account number
  • MSXdat expiration date
  • the number of data items in the printing, emboss, and mag stripe templates will vary depending on the configuration of the smart card desired by the card issuer as will be apparent to those skilled in the art.
  • the card issuer passes the application program identifiers to the smart card personalization system 100 in the sections 1121, 1123, 1125 of the card framework template record 1100.
  • Each application may have specific security functions associated with it (1127, 1129, 1131) and that information is also passed by the card issuer management system 950.
  • the card framework template record 1100 also contains the personalization equipment identifier 1123 for the personalization equipment to be used to issue the smart cards.
  • the smart card personalization system 100 stores commonly used card framework template records in an internal database so that the card issuer management system 950 needs to pass only a card framework template identifier that identifies which card framework template record is to be used for a particular batch of cards.
  • the smart card personalization system 100 acquires the data format template for the personalization data from a pre-defined location specified by the card issuer at block 1003. If the card issuer has passed a data format identifier to the system 100, the data formate template record corresponding to the data format identifier is retrieved from the data format database 920. Alternatively, the card issuer may pass the data format template record itself. When neither the data format identifier nor the data format template record is passed to the system 100, the format of the personalization data is determined by the card application data as explained in more detail below.
  • the data format template record 1200 defines an hypothetical layout of the personalization data records in the card holder database 952 in which the account number 1201 is the first field, the card holder's name 1202 is the second field, and the expiration date of the card 1205 is the third field.
  • the personalization data records are commadelimited records so no data field lengths are necessary to define the record format.
  • the data format template record 1200 shown in FIG. 12 completely defines the structure of the following example of a comma-delimited personalization data record to the smart card personalization system 100: 133444999922,Mary Jane Smith, 0299.
  • the smart card personalization system 100 acquires the application data for the card application, or applications, 922 corresponding to the application program identifiers, if any, that were passed by the card issuer management system 950 at block 1007. If no application program identifiers are passed, the smart card personalization system 100 acquires default application data (block 1008). The default and/or the application data in the card application data record(s) corresponding to the application program identifier(s) are inserted into the corresponding sections, i.e., 1121, 1123, 1125, of the card framework template record 1100.
  • the first field in the card application data record 1300 is the application name 1301.
  • a card application processes data from external sources such as an automatic teller machine or internal sources such as data files encoded into the microprocessor's memory.
  • Using the smart card causes the appropriate application to be executed by the microprocessor and the application, in turn, accesses the internal files to retrieve or store data.
  • the card application data record contains pointers to application files in the chip memory (1302, 1305, 1037) and also the location of fields within the application files. Some of the fields are initialized with data from the card holder database 952 when the card is issued.
  • the application data 1300 includes an address 1303 to a card holder file located in the chip memory and defines the card holder file as containing three fields: the card holder's name (ICName)1309, the account number (ICAcct) 1311 and the expiration date (ICXdat) 1313. Additional internal data is stored in other application files and the layout of those additional files is also defined by the application data 1300.
  • the smart card personalization system 100 acquires a set of programming control commands for the operating system from the card operation system database 924 at block 1011.
  • the programming control commands for each operating system includes commands for functions such as creating and accessing files in the memory of the chip, reading and writing records in the files located in chip 25 memory, along with security commands that authenticate PIN (Personal Identification Number) codes and control transactions that change monetary amounts stored in the chip.
  • PIN Personal Identification Number
  • the smart card personalization system 100 acquires the equipment characteristic data corresponding to the personalization equipment identifier in the card framework template record from the personalization equipment database 926 at block 1013. Included in the equipment characteristic data is a set of personalization programming control commands which control the operation of the personalization equipment. As is the case with the card operating systems, the personalization control commands are proprietary to the vendor of the equipment but typically include commands directed to the administration, formatting, and production of smart cards.
  • the smart card personalization system 100 When the smart card personalization system 100 has acquired all the data necessary to define a smart card, it is ready to accept personalization data records 952 from the card issuer management system 950. As each personalization data record 952 is passed at block 1015, the smart card personalization system 100 uses the data format template, if present, to translate the personalization data into an internal format, and the card application data and card framework template to map the personalization data into variables in a command script written in an internal scripting language at block 1017. The translation and mapping process is described further below. Alternate embodiments which use a standard programming language such as Basic, Java or C instead of the internal scripting language are within the scope of the invention.
  • the smart card personalization system 1019 checks for security requirements for the various components of the smart card issuing process.
  • the security requirements for the applications are specified by the card framework template record 1100 at block 1019. If there are security requirements, the smart card personalization system 100 acquires secure data and/or functions from the security manager 940 and adds the functions into the internal script at block 1021.
  • An alternate embodiment of the smart card personalization system 100 passes the identifiers of the card operating system and the personalization equipment, as well as the application program identifier, to the security manager 940 which retrieves the appropriate security data and/or functions from the security database 942.
  • the security functions typically use data from additional sources, including data stored in internal chip files, personalization data 952, the operating system database 924, the card application database 922, combined with the algorithm tables stored in the chip or from an external security module, such as the security manager 940, to perform the secure key authentication, data integrity, data secrecy and other security processes described above in conjunction with FIG. 2.
  • the internal command script Once the internal command script is completed, it must be translated into the proprietary programming control commands native to the card operating system (if present) and to the personalization equipment so that the personalization data is transferred to the smart card.
  • the translation is performed by a script language interpreter at blocks 1025 and 1027 using the information acquired from the card operating system database 924 and the personalization equipment database 926.
  • the smart card operating system 100 passes the interpreted script to the personalization equipment which then executes the programming control commands to emboss/print, encode and program the appropriate personalization data onto the surface, and into the magnetic stripe and chip respectively of the smart card.
  • the smart card personalization system 100 directs the control commands for the embossing and encoding to the personalization equipment 930 and the control command for the chip to the post-processor 132 in the smart card programming device.
  • the smart card personalization system 100 acquires the next personalization data record if there are additional cards of the same type waiting to issue (block 1033). Otherwise, the smart card personalization system determines if there is another batch of smart cards of a different type waiting to issue (block 1001) and begin the issuing process again by acquiring a new card framework template record from the card issuer.
  • the card issuer management system 950 requests the initiation of the issuing process by sending the smart card personalization system 100 a card framework template record, application program identifier(s), a card operating system identifier, a personalization equipment identifier, and optionally a data format template identifer or a data format template record.
  • the card issuer management system 950 passes an application resource template record shown below that contains the identifiers
  • the system 100 acquires a data format template using one of the procedures specified above and explained in more detail below in conjunction with the sample card holder data records.
  • the first statement in the record marks the beginning of information for a particular application, in this case application "A1”.
  • the next four statements define the identifiers for the card framework template record (DFT), the card application record (CAT), the card operating system record (CID) and the personalization equipment record (CPT).
  • the final statement is the name of a file created by the card issuing management system 950 that contains the card holder data record(s).
  • the card issuing management system 950 inputs the card holder data as either a single request or a ⁇ batch ⁇ of requests for cards to be issued.
  • the system 100 retrieves the records corresponding to the identifiers from the database.
  • the system 100 then uses the information contained in the card framework template and data format template to set up an internal "script,” which it later interpretes into the specific commands contained in the card operating system and personalization equipment records that instruct the personalization equipment to process the personalization data and issue the card for each card holder.
  • Two sample card holder data records 952 are shown below.
  • the format defined by the card issuer places the account name (card holder name) in the first field followed by the account number, expiration data, date of birth, and medical data.
  • the system 100 uses the data format template to interpret each card holder data record 952 as it is processed.
  • the system 100 also uses the data format template and card application records 922 to validate the data 952 ensuring proper data and format.
  • An example of a data format template corresponding to the format of the sample card holder records shown above is shown in the first line of the table below.
  • the James Smith personalization data record is included in the table to show the correspondence between the data format template and the fields of the card holder data record.
  • the data format template equates each field in the card holder record with an internal label, %1, %2, etc., which corresponds to the internal order used within the system 100.
  • the example shown above represents the simplest case in which the fields of a card holder data record 952 are arranged in the internal order used by the smart card personalization system 100.
  • This one-to-one correspondence means that the system 100 does not have to translate the card holder data fields into the internal field order. In such a case, the data format template record is unnecessary.
  • the card issuer does not pass a data format identifier to the smart card personalization system 100, but instead passes an indicator, such as a flag, which informs the system 100 that no data format template is needed because the card holder data fields are in a one-to-one correspondence with the internal field order.
  • the system 100 acts on the indicator by bypassing the translation step.
  • a more complex example shown next is one in which the fields of the card holder data record 952 and the data within the fields are out of order relative to the internal system order. In this case, translation is necessary.
  • the system 100 uses the data format template to translate the data fields into the internal order as shown above.
  • the translation may result in the physical rearrangement of the data fields or may be a logical rearrangement in which the data format template is invoked as a key each time a field from the card holder data record is referenced by the system 100.
  • Various data format templates designed to translate different arrangements of card holder data will be apparent to those skilled in the art as will the substitution of tables of field equivalences or a set of parsing instructions or other mechanisms for the simple table used above to illustrate this example.
  • the card framework template record describes the structure of the chip on the card.
  • the $MF entry defines a root directory (3F00), while $DF entries define a medical application (5F20), and an accounting application (5F10).
  • $EF entries define a medical application (5F20), and an accounting application (5F10).
  • Each directory are application-specific files defined by $EF entries, such as 6F00 containing the account name and 6F10 containing the account number. All file descriptive data resides in the card framework template and is referenced at various times during the smart card issuing process.
  • the card application record 922 "maps" the card holder data 952 to the data fields used by the application.
  • the sample card application record 922 shown below has its data entries arranged in the sequence in which they are processed by the smart card personalization system 100.
  • the ICCID entry contains the chip identifier.
  • the MED1 tag represents the fifth field in the card holder data record 952 and the data is in alpha format.
  • the FMTACCT entry breaks the second field in the card holder data record 952, i.e., the account number, into sections and inserts hyphens between the sections.
  • the card operating system record 924 contains the programming control commands necessary to program the chip on the card.
  • the sample card operating system programming control commands shown below are taken from the ISO directive number 7816-4 and are not the internal proprietary commands of any particular card operating system.
  • Each entry in the example record above contains a tag followed by the corresponding command in the native language of the card operating system.
  • Variable parameter fields are indicated by "%" followed by a letter and are filled in with the appropriate card holder data as each individual card is processed.
  • the personalization equipment record 926 contains personalization equipment characteristic data, such as instructions that define the actual sequence and steps necessary to issue a complete card on a specific set of personalization equipment.
  • the sample instructions used in this example are fictitious and do not represent the internal proprietary instructions for any particular personalization equipment.
  • the personalization equipment characteristic data shown above is serially processed in four steps defined by the entries preceded by a "$."
  • the card application record 922 is used to determine the value of the variable parameter fields in each instruction.
  • the $EMBOSS instruction is a single stream of data that begins with the control sequence #EMB# which notifies the personalization equipment that the data that follows should be embossed on the card.
  • Each data field in the instruction is enclosed in a pair of percent signs.
  • the first data field is FMTACCT, or the formatted account field as defined in the card application record 922.
  • the system 100 searches the card application record 922 for the FMTACCT entry and creates the string "1265-36830-91245" from the second data field in the first sample card holder record 952.
  • the next field, NAME is taken from the first data field in the card holder record 952.
  • the emboss instruction for the first sample card holder record 952 becomes #EMB%1265-36830-91245%%Smith,James%.
  • the $ENCODE instruction causes the system 100 to process the card holder data to be encoded on the magnetic stripe of the card in the same fashion as the emboss instruction. Additional control characters in accordance with following IATA (International Air Travel Association) and ISO standards are inserted into the command. The resulting instruction is #ENC#%%%12653683091245%%Smith,James%.
  • the $IC command specifies the information to be stored in the chip's memory.
  • the card operating system record 924 is used to translate the instructions in the personalization equipment record into the programming control commands for the operating system.
  • a control sequence, #/@# is used to notify the personalization equipment that the data that follows is chip data.
  • the first field to be stored is the chip identifier, ICCID.
  • the system 100 interprets the WRITE tag in the personalization equipment record 926 in accordance with the command identified with the WRITE tag in the card operating system record 924. Since no offset value is specified in the application record 922 for the chip identifier entry, the default of "0000" is loaded into the %O variable parameter field.
  • the %L variable parameter field is set to the value of the SIZE field in the $CHIP entry in the card framework template, i.e., "10" or hexadecimal "0A.”
  • the %D variable parameter field is set to the value of ICCID, "1234509876".
  • the resulting command is A0D000000A1234509876.
  • the next commands cause the card operating system to store the card holder name into the account name file in the account directory on the chip.
  • the system 100 translates the SELECT ACCT command into the corresponding card operating system command.
  • the system 100 locates the SELECT entry in the card operating system record 924, the ACCT entry in the card framework template record, and substitutes the specified directory path for the account directory defined in the ACCT entry, i.e. "5F10," for the %F variable parameter field in the command defined in the SELECT entry.
  • the resulting command is A0A40000025F10.
  • the SELECT NAME command causes the system 100 to substitute the account name file "6F00" for the %F variable parameter field.
  • the resulting command is A0A40000026F00.
  • the final command in this series is the WRITE command.
  • the system 100 interprets the WRITE command by substituting the default offset of "0000" for %O, the value of the SIZE field, "30" or hex "1E,” as defined by the NAME entry in the card framework template record for %L, and the card holder's name, "Smith,James” for the first sample card holder data record 952, for %D, to produce the command A0D000001ESmith,James ⁇ ⁇ ⁇ ⁇ ⁇ .about. ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ .about. where each " ⁇ " represents a trailing space inserted to pad the name out to thirty characters.
  • the system 100 processes the remainder of the commands in the personalization equipment record 926 in a similar fashion to produce a contiguous string of data containing the commands to issue a card for the first sample card holder data record 952:
  • the $PR command causes the system 100 to send the command data stream to the personalization equipment.
  • the smart card personalization system 100 encompasses alternate embodiments of the software program in which the functions of the system are performed by modules different than those shown in the FIGS.
  • the system 100 may process the data in a serial or parallel fashion, or a combination of the two, without departing from the spirit or scope of the invention.
  • the software program may be written in one of several widely available programming languages and the modules may be coded as subroutines, subsystems, or objects depending on the language chosen.
  • data used by the system 100 is described and represented as logical records embodied in a database but the invention is not limited to the described arrangement of data records, nor is the use of any particular type of data management system implied.
  • Relational database systems from vendors such as Oracle, Sybase, Informix, or Microsoft provide the necessary infrastructure for managing the underlying data in the system, whether it is centralized or distributed, but other organizational data structures, i.e., indexed flat files, may be substituted without exceeding the scope of the invention.

Abstract

A smart card personalization system maintains a database containing card issuer data format templates, card applications, card operating system commands, and personalization equipment specifications and provides a centralized interface of inputs and outputs to a card issuing process which dynamically adjusts to changes in the issuing process to easily permit a card issuer to change data formats, card applications, card operating systems and/or personalization equipment in a card issuing process. The system interfaces to any card issuer management system, manages the transfer of card holder data and card applications to the particular personalization equipment used, and maintains statistics for real-time and off-line inquiries to support critical management and reporting functions. Furthermore, the system works with a variety of security methodologies to prevent fraud.

Description

RELATED APPLICATION
This application is a non-provisional application claiming benefit under 35 U.S.C. § 119(e) of U.S. Provisional Application Ser. No. 60/015,743, filed Apr. 15, 1996.
FIELD OF THE INVENTION
The present invention is related to data storage devices and in particular to producing portable programmed data carriers such as credit cards, debit cards, identification cards, and other transaction cards.
BACKGROUND OF THE INVENTION
Increasing numbers of organizations which issue transaction cards to their users, customers, or employees require cards tailored to meet the requirements of their particular service or application. These organizations also want the cards to contain data about the card holder. Existing transaction cards encode such data in a magnetic stripe on the back of the card but the amount of data that can be held by a magnetic stripe is limited. A new type of transaction card embeds a microprocessor computer chip in the plastic of the card to greatly increase the card's data storage capacity. Additionally, sophisticated card applications specific to the card issuer can execute in certain varieties of the chips, and the chip may also contain a type of operating system. Transaction cards with embedded chips are referred to in the industry as portable programmed data carriers, more commonly called "smart cards." The chip in a smart card is programmed with initialization and/or personalization data at the same time as the surface of the card is being embossed and/or printed.
The initialization data comprises three major types of information: application data, security data, and printed data. The application data is common to all cards for a given card application and includes application program code and variables. The security data prevents fraudulent use of the card and is usually provided in the form of "secure keys." Printed data, such as a logo, bar codes, and various types of numerical information, are placed on the surface of the card. Some or all of the same data can also be embossed on the surface. Optical technology also can be employed to make part or all of the surface of the card into a storage medium with data accessible by an appropriate optical reader.
Smart cards are also programmed with information specific to an individual card holder through a process called "personalization." The personalization information for a smart card is similar to the personalization information currently contained on non-smart cards, such as the card holder's name, account number, card expiration date, and a photograph. Because of its increased storage capacity, the chip in a smart card can contain additional data beyond the basic information on the standard transaction card including a graphical representation of the individual's signature, data defining the types of service the card holder is entitled to, and account limits for those services.
The smart card issuing process must control and report on each personalized card and the results of the personalization process. Extensive report and audit files thus must be maintained to support the card tracking requirements.
Currently, a smart card issuing system must be tailored to meet the requirements of a specific card application that will be programmed on a specific type of smart card under the control of a specific card operating system and to format the data for the card to be compatible with a specific type of personalization equipment chosen to issue the card. The entire issuing system must be re-configured whenever any one of these variables (issuer application, smart card/card operating system, and/or personalization equipment) is changed, increasing the time and cost incurred by the issuer of the card in delivering personalized smart cards to its customers. Additionally, many of the current issuing systems lack a viable means to provide dynamic feedback regarding the status of any particular batch of cards in the process to the card issuer.
Furthermore, the smart card issuing systems in use today utilize a proprietary approach developed by either the card manufacturer or the personalization equipment manufacturer. To encourage sales of their respective cards or equipment, each manufacturer develops a unique personalization solution for a particular card application, and each solution is specific to a particular card issuer. These unique solutions are intended to optimize performance of the cards or equipment and thus do not permit a more inclusive, generalized personalization process that accepts any card operating system and/or work with any personalization equipment.
As the demand for smart cards increases, a smart card issuing system which permits the card issuers to use any type of personalization equipment to handle multiple types of smart cards, and their attendant operating systems, and to embed the issuers' specific card applications along with the required card holder data in any of the various types of smart cards is required.
SUMMARY OF THE INVENTION
A smart card personalization system maintains a database containing card application data, issuer format template data, card operating system data, and personalization equipment data to permit a card issuer to dynamically change card applications, card and card operating systems, and/or personalization equipment in a card issuing process without the necessity of modifying the card issuer's interface to the issuing process.
The smart card personalization system issues portable programmed data carriers, or smart cards, by first acquiring a data format identifier, a card operating system identifier, a personalization equipment identifier, an application program identifier or identifiers, and personalization data for a card holder from a card issuer management system. The identifiers permit the system to address data stored in a data structure, such as a database, and specify the particular data needed by the system for each card to be issued. Because each card issuer formats its personalization data differently and may have multiple data formats, the smart card personalization system has a database of data format templates that enable it to interface with multiple card issuer management systems. The system acquires the format template defining the personalization data used by a particular card issuer from a record in the database identified by the data format identifier. The system uses the data format template to translate the personalization data from the card issuer's format into an internal format recognized by the components of the system. The system uses the card operating system identifier and application program identifier(s) to acquire programming control commands for an operating system pre-loaded in a microprocessor chip embedded in the card, and application data, in the form of code and/or variables, for an application program type or types from the database. The system also acquires the equipment characteristic data for the personalization equipment to be used to issue the smart card using the personalization equipment identifier. Once the system has acquired all the data necessary to issue the smart card it transfers the programming control commands, the application code and variables, and the translated personalization data to the personalization equipment as specified by the equipment characteristic data.
Alternatively, no data format identifier is passed by the card issuer because the data format template is derived from data in the application data record or because the format of the personalization corresponds on a one-to-one basis with the internal format used by the system. The card issuer may also substitute the data format template record for the data format identifier so the system does not need to reference its database of format records.
Another feature of the smart card personalization system is its card management function. The smart card personalization system collects information regarding the card issuing process and reports this information to the card issuer management system.
Smart cards may include one or more "secure keys" that are programmed into the chip to prevent fraudulent use of the card. The appropriate secure key data is obtained by the smart card personalization system from secure key records maintained by the card issuer, or another security source, and then transferred to the personalization equipment. The security source also provides security functions that are used by the smart card personalization system to ensure the integrity and secrecy of data during the transmission of data to and from the system and within the system during the smart card personalization process.
The smart card management system performs the functions described above through a series of software modules executing on a computer or multiple computers. One module is a card issuer management system interface which acquires the data format identifier, the card operating system identifier, the personalization equipment identifier, the application program identifier(s), and the personalization data for a card holder from the card issuer management system. The card issuer management system interface then uses the data format identifier to acquire the format template that defines the personalization data and translates the personalization data into the common, internal data format. A card operating system interface module acquires the programming control commands for the card operating system type specified by the card operating system identifier. A card application interface module uses the application program identifier(s) to determine which type(s) of application program is to be placed on the card and acquires the specified application code and variables. A personalization equipment interface module is responsible for the acquisition of the equipment characteristic data for the personalization equipment type specified by the personalization equipment identifier, and further for transferring the programming control commands, the application code and variables, and the translated personalization data to the personalization equipment in accordance with the requirements stipulated by the equipment characteristic data.
The reporting and security functions are provided by a tracking/report module and by a secure key management module.
The smart card personalization system uses an underlying data structure, such as a database, residing in a computer storage medium to organize the data necessary to issue the smart cards. The data structure comprises several different types of data elements and uses "indices" or "identifiers" to quickly access specific data. There are four main data elements in the system: a data format element, a card operating system element, an application program element, and a personalization equipment element.
The data format element contains a template that defines the format of the personalization data used the card issuer. The data format element may be stored in a database containing data format elements for various card issuer and the information stored in the data format element is accessed through the data format identifier. Alternatively, the data format element may be derived at the time the card is issued from data in the application program element(s) so that the application program identifier(s) passed by the card issuer identify the data format. When the data format of the personalization data corresponds exactly to the internal format used by the smart card personalization system, the data format template is logically implied which creates a virtual data format element for the issuing process.
The card operating system element holds the programming control commands that direct the card operating systems controlling a smart card chip and is accessed through the card operating system identifier.
The application program element(s) contains application data, such as program code and variables, required by the applications associated with various card issuers; application data is accessed through an application program identifier(s).
Operating parameters for various types of personalization equipment used to issue smart cards are stored in the personalization equipment element and accessed through a personalization equipment identifier corresponding to the type of the personalization equipment to be used during an issuing run.
Special configurations of the smart card personalization system support card issuers that do not need the full flexibility of the system described above.
The smart card personalization system addresses the weakness in the prior art by providing a centralized interface of inputs and outputs to the smart card personalization process which is designed to dynamically accommodate changes in the issuing process. The system interfaces to any issuer management system, manages the transfer of card holder data and card applications to the particular personalization equipment used, and collects statistics for real-time and off-line inquiries to support critical management and reporting functions. The system maintains a database of issuer data formats, card operating systems, card application programs, and types of personalization equipment. This database enables the system to handle any combination or permutations of the data, thus improving cost and time to market for the issuer. Furthermore, the system interfaces with various card security methodologies to reduce fraud.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1A is a block diagram representing a smart card issuing process that incorporates a smart card personalization system.
FIG. 1B is a functional block diagram of input and output connections for the smart card personalization system shown in FIG. 1A.
FIG. 1C is a functional block diagram showing software modules and data structures which comprise one embodiment of the smart card personalization system shown in FIG. 1B.
FIG. 2 is the functional block diagram of the embodiment of FIG. 1C with the addition of a security module to manage keys used for smart cards.
FIG. 3 is a functional block diagram of another embodiment of the smart card personalization system showing a minimal configuration to manage multiple types of cards and personalization equipment.
FIG. 4 is the functional block diagram of the embodiment of FIG. 3 with the addition of a module to manage multiple card operating systems.
FIG. 5 is the functional block diagram of the embodiment of FIG. 4 with the addition of the security module.
FIG. 6 is the functional block diagram of the embodiment of FIG. 3 with the addition of a module to manage multiple card applications.
FIG. 7 is the functional block diagram of the embodiment of FIG. 6 with the addition of the security module.
FIGS. 8A, B represent a high level flow chart for computer software which implements the functions of the smart card personalization system.
FIG. 9 is a functional block diagram of an alternate embodiment of the smart card personalization system using software modules and data records.
FIGS. 10A, B represent a high level flow chart for computer software which implements the functions of the embodiment of the smart card personalization system shown in FIG. 9.
FIG. 11 is a data field chart for a card framework template record used by the embodiment of the smart card personalization system shown in FIG. 9.
FIG. 12 is a data field chart for a data format template record used by the embodiment of the smart card personalization system shown in FIG. 9.
FIG. 13 is a data field chart for a card application data record used by the embodiment of the smart card personalization system shown in FIG. 9.
FIGS. 14, 14A, 14B represent a report format showing sample items tracked by the smart card personalization system.
DESCRIPTION OF THE EMBODIMENTS
In the following detailed description of the embodiments, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that structural, logical and electrical changes may be made without departing from the spirit and scope of the present inventions. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present inventions is defined only by the appended claims.
The leading digit(s) of the reference numbers in the Figures usually correspond to the figure number, with the exception that identical components which appear in multiple figures are identified by the same reference numbers.
Issuing Smart Cards
Standard transaction cards such as regular credit cards are familiar to most people. A transaction card usually has information about the card holder, such as name and account number, printed and/or embossed on the surface of the card. Transaction cards frequently contain a magnetic stripe which is encoded with card holder data as well. The process of printing/embossing/encoding the card holder data on each transaction card is known as "personalization." Each transaction card also undergoes a process known as "initialization" in which certain types of information common to all cards in a batch, such as an issuer identifier and batch number, are placed on the card.
A smart card differs from a standard transaction card in that a computer microprocessor chip is embedded in the plastic of the card to greatly increase the card's data storage capacity. In some varieties of smart cards, the card manufacturer pre-loads the chip with one of several possible card operating systems and the operating system controls the programming of the chip during the personalization process. Additionally, sophisticated card applications specific to the card issuer may execute in certain varieties of the chips.
The initialization data for a smart card comprises three major types of information: application data, security data, and printed data. The application data is common to all cards for a given card application and includes application program code and variables that are programmed into the chip. The security data, usually provided as secure keys or security functions, validates the data on the card and prevents fraudulent use of the card. Printed data, such as a logo, bar codes, and various types of numerical information, are printed on the surface of the card. Some or all of the same data may also be embossed on the surface. Optical technology also may be employed to make part of the surface of the smart card into a storage medium with data accessible by an appropriate optical reader.
The personalization information for a smart card is similar to the personalization information currently contained on non-smart cards, such as the card holder's name, account number, card expiration date, and a photograph. Because of its increased storage capacity, the chip in a smart card may contain additional data beyond the basic information on the standard transaction card including a graphical representation of the individual's signature, data defining the types of service the card holder is entitled to, and account limits for those services.
Smart Card Personalization System
FIG. 1A shows components of a smart card issuing process that incorporates an embodiment of the smart card personalization system of the present invention. The smart card personalization system 100 receives data from a card issuer management system 150 (typically proprietary to the card issuer), translates the data into a data stream, and outputs the data stream to personalization equipment 130 which personalizes the smart cards 160. The card issuer management system 150 manages the card holder data and determines the type of card to issue, the card applications to embed in the card, and what personalization equipment to use to issue the card for a particular card holder. The card issuer management system is frequently a computer program as illustrated in FIG. 1A, but the smart card personalization system 100 is capable of receiving data from alternate inputs, such as a person inputting the data from a telephone keypad.
The smart card personalization system 100 is illustrated in FIG. 1A as a software program executing in a computer. As described below, the smart card personalization system 100 accesses database records which define various types of cards and card operating systems, card applications, and personalization equipment. The logical functions of the software and the database may be distributed among computers in a client/server network or centralized into a single processor. The functions may also be distributed across processors connected through standard local area networks, wide area networks, dedicated phone lines or other communication means used to loosely couple processors. The software program executes under an operating system such as Unix, Windows 95©, or Windows NT©, and on industry-standard workstation and/or personal computer hardware.
The system 100 controls card printers, embossing devices, and integrated or add-on smart card interface devices collectively represented in FIG. 1A as personalization system 130. Personalization equipment 130 also represents such devices as large volume card printer/embossers, small volume card printer/embossers, automatic teller machiners (ATMs), point of sale terminals, unattended kiosks, personal computers, network computers, and on-line telecommunication devices. Because of their investment in existing non-smart card personalization equipment, many card issuers do not purchase entirely new smart card personalization equipment but instead augment their existing personalization equipment with a smart card interface device which programs the chip in the card while the older device performs the printing and embossing functions. In such a configuration, the computer system executing the smart card personalization system 100, or "host," may be physically connected to both devices or to only one of the devices. In the latter case, the host controls the directly-connected device and has a logical connection to the other. The physical connection between the devices and the host varies according to the manufacturer and model of the device. Common industry standard connections include serial RS232, SCSI (Small Computer System Interface), Ethernet, and serial TTL (Transistor-Transistor Logic). In addition, some devices require a proprietary bus connection.
The connections between the smart card personalization system 100 and the card management system 150 and the devices 130 may also be implemented through standard local area networks, wide area networks, dedicated phone lines, or other remote communication infrastructure used to transfer data. The use of such remote connections when personalizing smart cards is described in U.S. Pat. No. 5,524,857 issued on Jul. 9, 1996, to Laing, et al. Alternate connections will be apparent to those skilled in the art and are within the scope of the invention.
FIG. 1B is a block diagram of one embodiment of the smart card personalization system illustrating the logical connections between the smart card personalization system 100 and functions employed by a card issuing organization to issue smart cards. Card holder data maintained by the card issuing organization contains information about each individual card holder, such as name, account number, card expiration date, and applicable services. Various ways of inputting the card holder data into the card issuer management system 150 are shown in phantom as card holder data 152 in FIG. 1B. The card issuer management system 150 may receive the card holder data on computer media, such as magnetic tape, floppy disk, or CD ROM. Alternatively, the card holder data 152 may be input through an on-line connection such as a general switched telephone network, a packet-switched network, i.e., the Internet, a dedicated line, or a cable/satellite television signal. Additional ways in which the card holder data 152 may be input to the system 150 will be apparent to those skilled in the art.
In addition to the card issuer management system 150, the card issuer typically has an existing reporting capability 154 with which the smart card personalization system 100 interfaces so that the card issuer can review statistical information maintained by the system 100. An external security source, also provided by the card issuer and shown as secure key manager 111 and secure key database 128, provides security functions that work in conjunction with the card issuer management system 150 and the smart card personalization system 100. FIG. 1B also illustrates an alternate embodiment of the smart card personalization system 100 which supports a card issuer that has add-on smart card interface devices. The system 100 directs a portion of the personalization information to the older personalization equipment 130 and the remainder of the data to a post-processor 132 in the smart card interface device 132 which programs the chip. These functions are explained in detail below.
The embodiments of the software program for the smart card personalization system 100 shown in the following Figures function as combinations of code modules with each module executing a specific part of the issuing process. In these embodiments, the modules are coupled through defined input and output program calls, and are also coupled to the data structures through standard data query commands that provide access to the data stored in the data structures. The communication protocols between the modules, and between the modules and the data structures vary depending on the language in which the modules are written and upon the underlying data management system employed to support the database.
FIG. 1C is a more detailed functional block diagram of the smart card personalization system 100 of FIG. 1 B without the external security functions. FIG. 1C shows the internal connections between software modules and database records that enable the smart card personalization system 100 to combine multiple types of issuer data formats, card operating systems, card applications and personalization equipment when issuing smart cards.
The smart card personalization system 100 provides a customized card issuer management interface 101 to a card issuer management system 150. In this embodiment, the card issuer management system 150 passes personalization data from a card holder database 152 to the system 100. Each software module within system 100 expects the personalization data to be passed to it in a particular, internal format. Because the personalization data is in an external format defined by the card issuer that often differs from the internal format(s) expected by the software modules, the personalization data is translated by the system 100 into the internal format(s) using the data format template. The system 100 may acquire the data format template through a data format identifier passed by the card issuer that the system 100 uses to acquire an optional data format template record 120 (shown in phantom in FIG. 1C) as illustrated by an optional connection between the record 120 and the card issuer management system interface 101. Alternatively the card issuer passes the data format template record to the system 100 instead of the data format identifier. In another embodiment, the data format template may be derived from the data in the card application record 124 that is specified by an application program identifier passed by the issuer as illustrated by an optional connection between the card application database 124 and the card issuer management system interface 101.
In a further alternate embodiment of FIG. 1C, security functions are provided internal to the smart card personalization system 100, by passing security functions into the system as part of the card application record.
A further alternate embodiment in which the personalization data format matches the internal format is also shown in FIG. 1C. Because no translation between the external and internal formats is necessary in this embodiment, no data format template is needed so the data format record 120 and the connections between the card issuer management system interface 101 and the data format record 120 and the card application database 124 are not present. The data format record may 120 be composed of a plurality of tables which instruct the system 100 as to the proper parsing of the personalization data or a simple list that indicates the order in which the fields of the card holder data record appear as will be apparent to those skilled in the art. The various alternate procedures for determining the format of the personalization data described above are implicit in all the embodiments of the smart card personalization system 100 described herein.
Using a card identifier provided by the card issuer management system 150, a card operating system interface module 103 retrieves programming control commands specific to the card operating system 122 for the microprocessor chip that is embedded in the type of card being issued. The programming control commands direct the encoding of the chip with the personalization data and the card application(s) chosen by the card issuer.
Each card application comprises program code and variable data that is stored in the database as application data 124 and is identified by an application program identifier. The card issuer management system 150 passes one or more program application identifiers to the system 100 which are used by a card application interface module 105 to acquire the corresponding application data 124.
The personalization equipment that the card issuer plans to use to issue the batch of cards is defined by a personalization equipment identifier. A personalization equipment interface module 107 acquires equipment characteristic data 126 specific to the type of personalization equipment 130 corresponding to the personalization equipment identifier. The personalization equipment interface 107 also acquires the programming control commands, the application code and variables, and the translated personalization data, and transfers all of this data to the personalization equipment 130 as specified by the equipment characteristic data 126 to issue the smart card.
An alternate embodiment of the system 100 supports a card issuer that has augmented their existing personalization equipment with a smart card programming device by having the personalization equipment interface 107 direct a subset of the translated personalization information to the older personalization equipment 130 and the remainder of the data to a post-processor 132 in the smart card programming device.
The smart card personalization system 100 also provides a tracking/report module, or engine, 109 that collects statistical information from the other modules in the system 100 and formats the statistical information for output as hard-copy reports 154 or as input to a reporting function in the card issuer management system 150. Because this statistical information is being gathered in real-time, the card issuer management system 150 can interactively query tracking/report module 109 to obtain statistics about the smart card personalization system as it is executing. Examples of items monitored by the tracking/report module 109 are shown in FIG. 14.
In an alternate embodiment shown in FIG. 2, the smart card personalization system 100 includes a security source in the form of a secure key manager module 111 and secure key database 128. When a smart card is manufactured, the vendor includes security architecture on the chip to prevent unauthorized programming. The security architecture implementation is commonly dependent on the application(s) programmed onto the chip. For example, the secure keys programmed in a stored value application would be different than the secure keys programmed in a health care application. The security architecture implementation also varies depending on the type of card: some cards require a single secure key which enables chip programming while others require multiple secure keys to enable chip programming and to perform additional security functions. FIG. 2 illustrates the basic functions of the secure key manager 111 when interfacing with the security architecture on a card that requires multiple secure keys.
As shown in FIG. 2, the secure key data is stored in the secure key database 128 which is external to the smart card personalization system 100 and maintained by the card issuer or other security source. Extending the secure key manager 111 to handle more or fewer secure keys, and to interface with a secure key database managed by the smart card personalization system 100 itself, is dependant on the application, operating system, and personalization equipment being used in the specific card issuing application, and will be apparent to those skilled in the art.
The secure key manager 111 also provides additional mechanisms to ensure secure key data authentication, data integrity and data secrecy. In one embodiment, secure key data authentication is accomplished through the implementation of various encryption methods. Secure key data integrity is achieved through digital signature mechanisms that use public keys to ensure that secure key data is being transmitted and received from valid sources. Secure key data secrecy is ensured by encrypting the transmitted data with a private key that is shared with the data receiver and which the data receiver uses to decrypt the data upon receipt.
After the system 100 receives a secure key record from the secure key database 128, the secure key manager 111, in conjunction with the card operating system interface 103 and the card application interface 105, perform the secure key authentication, data integrity and data secrecy functions. The system 100 then transfers the secure key data to the personalization equipment 130 through the personalization equipment interface 107 along with the other data for the card.
In an alternate embodiment, the secure key manager 111 passes security information to the other modules of the smart card personalization system 100. For example, portions of the card holder data, such as the PIN (Personal Identification Number) code, may be encrypted by the card issuer management system 150 prior to passing the data to the smart card personalization system 100. The card issuer management system interface 101 retrieves the encryption key from the secure key database 128 through the secure key manager 111, and decrypts the data prior to encoding or programming the PIN code into the magnetic stripe and/or the chip.
In a further alternate embodiment, the secure key manager 111 is a code "hook" into the smart card personalization system 100 which provides a gateway connection for an external security source that supplies the required security functions. An example of such an external security source is a security manager program written by a third party that manages a security database of secure keys and/or security functions similar to secure key database 128. The security functions may be either external routines executed by the security manager, or code modules passed by the security manager which are then executed by the smart card personalization system 100 to provide the required security functions, or a combination of both.
FIG. 3 illustrates a minimal configuration of the smart card personalization system 100. In this embodiment, only the card issuer management system interface modules 101 and the personalization equipment interface modules 107 are enabled in the software. This embodiment permits card issuer to use the system 100 to personalize non-smart cards, thus saving the cost of having two separate personalization systems, while permitting the card issuer to use multiple data formats and multiple types of personalization equipment. FIG. 3 also illustrates an additional alternate embodiment that includes the tracking/report module 109 as described above in conjunction with FIG. 1C.
In a still further alternate embodiment, the smart card personalization system 100 shown in FIG. 3 encodes data onto an optical transaction card when optical-encoding equipment is used as the personalization equipment 130.
FIGS. 4 and 5 depict still further alternate embodiments that are implemented when the card issuer does not program a card application on the smart card chip. These embodiments allow the card issuer to issue multiple card types with their attendant variety of operating systems on multiple types of personalization equipment without having to reconfigure the smart card personalization system 100. As described above in conjunction with FIG. 1C, FIG. 4 includes the modules that support reporting and post-processing. FIG. 5 illustrates the embodiments of FIG. 4 with the addition of the secure key manager module 111 that provides security to the card operating system interface 103 for transmission to the personalization equipment 130.
Similarly, FIGS. 6 and 7 illustrate embodiments to support a card issuer that uses the chip on a smart card only as a data storage device for a card application, and so does not have an operating system executing on the chip. Smart card personalization system 100 supports multiple card applications for multiple card types issued with multiple types of personalization equipment. FIGS. 6 and 7 are analogous to FIGS. 4 and 5 except that the secure key manager 111 provides secure keys and/or functions to the card application interface 105 instead of the card operating system interface 103.
FIG. 8 is a high level flow chart for one embodiment of software which implements the functions of the smart card personalization system 100 described above. The software acquires a personalization equipment identifier for a batch of transaction cards to be issued from the card issuer management system at block 801. Depending on the type of cards to be issued, the software also acquires a program application identifier(s) and/or a card operating system identifier at the same time. The software then acquires the particular data format template corresponding to the format of the personalization data through one of the procedures described above (block 803). At block 805, the system acquires the equipment characteristics for the personalization equipment to be used to issue the batch of cards from the personalization equipment record specified by the personalization equipment identifier.
If a card operating system identifier was passed by the card issuer management system (block 807), the software retrieves the programming control commands from the card operating system database record corresponding to the card operating system identifier at block 809. Blocks 811 and 813 perform the same logic for a card application, retrieving the application data, such as code and/or variables, from the database. At this point, the software has acquired the common data necessary for all the cards in the batch and begins looping through the logic which issues cards for the individual cardholders.
The card issuer management system passes the personalization data for a single card holder to the software (block 815) which translates the data items from the format defined by the data format template into an internal format used by the modules of the smart card personalization system (block 817). If the card chip contains security architecture that requires secure keys (block 819), the software acquires the secure key data necessary to perform the secure key functions from the appropriate secure key source at block 821.
The software is now ready to transfer data to the personalization equipment to program the card. If the card is protected by secure keys, the secure key functions are performed and the secure key data is transferred at block 823. Then the programming control codes for the chip operating system, if applicable, are transferred (blocks 825 and 827); next the application code and/or variables are transferred if they are needed (blocks 829 and 831). Finally, the card holder's personalization data that was translated into the internal format is transferred (block 833).
After the data has been transferred to the card, the software adds the appropriate values to the statistics it collects for the card issuer management system at block 839. If more cards in the same batch remain to be issued (block 841), the software returns to block 815 and acquires the personalization data for the next card holder. Otherwise, the software determines if the card issuer management system has a different batch of cards to issue (block 843) and returns to block 801 to acquire the necessary information to repeat the cycle for the new batch. If no further cards are to be issued, the software exits.
The mechanisms by which the card issuer management system 150 passes the necessary data to the smart card personalization system 100 and the order in which the smart card personalization system processes the data from the card issuer management system may be changed without exceeding the scope of the invention. Different arrangements are dictated by the specific environment in which the system 100 operates as shown in the alternate embodiment illustrated in FIGS. 9 and 10.
In FIG. 9, a security module 911 acts as a gateway into the smart card personalization system 100 for a security source such as security manager 940 and security database 942 shown in FIG. 1B as 111 and 128 respectively. The security manager 940 controls access to the security database 942 and connects into the security gateway 911 to perform the necessary security functions for the smart card personalization system 100. The security gateway 911 is coupled to the card issuer management system interface 901 which allows the interface 901 to request that the security manager 940 decrypt personalization data passed in an encryption format by the card issuer management system 950. The security gateway 911 is also coupled to the card application interface 903 and the card operating interface 905 so that it can supply the necessary secure keys and/or security functions to those interfaces as explained above in conjunction with FIG. 2.
Furthermore, the embodiment of the smart card personalization system 100 shown in FIG. 9 acquires the application data 922 specified by the application program identifier prior to acquiring the programming control commands specific to the card operating system 924 using the card identifier. This embodiment permits the personalization data and the application data to be translated into the internal format prior to retrieving the programming commands for the card operating system 924 and the equipment characteristic data 926, thus speeding the processing of each smart card.
Standard transaction cards have data printed and embossed on the surface of the card and/or data encoded in a magnetic stripe on the card. With a smart card, data may also be stored in an internal memory area within the microprocessor. The same data may be placed on the surface of the card, in the magnetic stripe and also in the chip memory. The exact configuration of the data in and on the card will vary depending on the type of smart card being issued and the requirements of the card issuer.
FIG. 10 is a high level flow chart of the embodiment shown in FIG. 9 and, in conjunction with FIGS. 11, 12 and 13, further illustrates how different mechanisms may be used to implement the smart card personalization system 100. The card issuer management system 950 passes a card framework template that defines the configuration of the smart card to the smart card personalization system 100 at block 1001.
FIG. 11 illustrates one embodiment of the data layout for the card framework template record 1100. The microprocessor chip identifier 101 and the card operating system identifier 1102 (if present) are specific to the type of smart card to be issued. The master file definition 1103 contains control information such as the chip source and the last date the chip was altered. The system file definitions 1104, 1105, 1107 contain addresses for the location of the system files within the memory of the chip. The system files are used by the card operating system and contain information such as the PIN code(s) for the card and applications, and algorithm tables. In the embodiment shown in FIG. 11, the master file and the system file definitions conform to the International Standards Organization (ISO) directive number 7816-4.
The next three sections of the card framework template record 1100 define the arrangement of data on the surface and magnetic stripe of the card. If information is to be printed on the card, such as the card holder's photograph 1109, the location on the surface of the card to print such data is passed by the card issuer management system 950 in the printing template of the card framework template record 1100. Similarly, the locations on the surface of the card to emboss data is passed in the emboss template, and the arrangement of the data to be encoded in the magnetic stripe is passed in the mag stripe template. The emboss data is illustrated in the card framework template record 1100 as the card holder's name (EMName) 1111, account number (EMAcct) 1113, and expiration date (EMXdat) 1115 and the magnetic stripe data by the account number (MSAcct) 1117 and the expiration date (MSXdat) 1119. The number of data items in the printing, emboss, and mag stripe templates will vary depending on the configuration of the smart card desired by the card issuer as will be apparent to those skilled in the art.
If the card issuer wants card applications programmed into the chip in the smart card, the card issuer passes the application program identifiers to the smart card personalization system 100 in the sections 1121, 1123, 1125 of the card framework template record 1100. Each application may have specific security functions associated with it (1127, 1129, 1131) and that information is also passed by the card issuer management system 950. The card framework template record 1100 also contains the personalization equipment identifier 1123 for the personalization equipment to be used to issue the smart cards.
In an alternate embodiment, the smart card personalization system 100 stores commonly used card framework template records in an internal database so that the card issuer management system 950 needs to pass only a card framework template identifier that identifies which card framework template record is to be used for a particular batch of cards.
The smart card personalization system 100 acquires the data format template for the personalization data from a pre-defined location specified by the card issuer at block 1003. If the card issuer has passed a data format identifier to the system 100, the data formate template record corresponding to the data format identifier is retrieved from the data format database 920. Alternatively, the card issuer may pass the data format template record itself. When neither the data format identifier nor the data format template record is passed to the system 100, the format of the personalization data is determined by the card application data as explained in more detail below.
An example of a data format template record is shown in FIG. 12. The data format template record 1200 defines an hypothetical layout of the personalization data records in the card holder database 952 in which the account number 1201 is the first field, the card holder's name 1202 is the second field, and the expiration date of the card 1205 is the third field. In one embodiment, the personalization data records are commadelimited records so no data field lengths are necessary to define the record format. Thus the data format template record 1200 shown in FIG. 12 completely defines the structure of the following example of a comma-delimited personalization data record to the smart card personalization system 100: 133444999922,Mary Jane Smith, 0299.
The smart card personalization system 100 acquires the application data for the card application, or applications, 922 corresponding to the application program identifiers, if any, that were passed by the card issuer management system 950 at block 1007. If no application program identifiers are passed, the smart card personalization system 100 acquires default application data (block 1008). The default and/or the application data in the card application data record(s) corresponding to the application program identifier(s) are inserted into the corresponding sections, i.e., 1121, 1123, 1125, of the card framework template record 1100.
One embodiment of the layout of a card application data record is shown in FIG. 13. The first field in the card application data record 1300 is the application name 1301. As with other computer-based application programs, a card application processes data from external sources such as an automatic teller machine or internal sources such as data files encoded into the microprocessor's memory. Using the smart card causes the appropriate application to be executed by the microprocessor and the application, in turn, accesses the internal files to retrieve or store data. To access internal data, the card application data record contains pointers to application files in the chip memory (1302, 1305, 1037) and also the location of fields within the application files. Some of the fields are initialized with data from the card holder database 952 when the card is issued. The application data 1300 includes an address 1303 to a card holder file located in the chip memory and defines the card holder file as containing three fields: the card holder's name (ICName)1309, the account number (ICAcct) 1311 and the expiration date (ICXdat) 1313. Additional internal data is stored in other application files and the layout of those additional files is also defined by the application data 1300.
If the chip embedded in the smart card contains an operating system as specified by the card framework template record, the smart card personalization system 100 acquires a set of programming control commands for the operating system from the card operation system database 924 at block 1011. The programming control commands for each operating system includes commands for functions such as creating and accessing files in the memory of the chip, reading and writing records in the files located in chip 25 memory, along with security commands that authenticate PIN (Personal Identification Number) codes and control transactions that change monetary amounts stored in the chip.
The smart card personalization system 100 acquires the equipment characteristic data corresponding to the personalization equipment identifier in the card framework template record from the personalization equipment database 926 at block 1013. Included in the equipment characteristic data is a set of personalization programming control commands which control the operation of the personalization equipment. As is the case with the card operating systems, the personalization control commands are proprietary to the vendor of the equipment but typically include commands directed to the administration, formatting, and production of smart cards.
When the smart card personalization system 100 has acquired all the data necessary to define a smart card, it is ready to accept personalization data records 952 from the card issuer management system 950. As each personalization data record 952 is passed at block 1015, the smart card personalization system 100 uses the data format template, if present, to translate the personalization data into an internal format, and the card application data and card framework template to map the personalization data into variables in a command script written in an internal scripting language at block 1017. The translation and mapping process is described further below. Alternate embodiments which use a standard programming language such as Basic, Java or C instead of the internal scripting language are within the scope of the invention.
The smart card personalization system 1019 checks for security requirements for the various components of the smart card issuing process. In the embodiment of the card framework template shown in FIG. 11, the security requirements for the applications are specified by the card framework template record 1100 at block 1019. If there are security requirements, the smart card personalization system 100 acquires secure data and/or functions from the security manager 940 and adds the functions into the internal script at block 1021. An alternate embodiment of the smart card personalization system 100 passes the identifiers of the card operating system and the personalization equipment, as well as the application program identifier, to the security manager 940 which retrieves the appropriate security data and/or functions from the security database 942. The security functions typically use data from additional sources, including data stored in internal chip files, personalization data 952, the operating system database 924, the card application database 922, combined with the algorithm tables stored in the chip or from an external security module, such as the security manager 940, to perform the secure key authentication, data integrity, data secrecy and other security processes described above in conjunction with FIG. 2.
Once the internal command script is completed, it must be translated into the proprietary programming control commands native to the card operating system (if present) and to the personalization equipment so that the personalization data is transferred to the smart card. In this embodiment, the translation is performed by a script language interpreter at blocks 1025 and 1027 using the information acquired from the card operating system database 924 and the personalization equipment database 926.
At block 1029, the smart card operating system 100 passes the interpreted script to the personalization equipment which then executes the programming control commands to emboss/print, encode and program the appropriate personalization data onto the surface, and into the magnetic stripe and chip respectively of the smart card. As before, if the card issuer has elected to purchase an add-on smart card programming device to attach to its existing personalization equipment, an alternate embodiment of the smart card personalization system 100 directs the control commands for the embossing and encoding to the personalization equipment 930 and the control command for the chip to the post-processor 132 in the smart card programming device.
When the issue process has been completed for one card, the smart card personalization system 100 acquires the next personalization data record if there are additional cards of the same type waiting to issue (block 1033). Otherwise, the smart card personalization system determines if there is another batch of smart cards of a different type waiting to issue (block 1001) and begin the issuing process again by acquiring a new card framework template record from the card issuer.
The following example uses sample data to further describe the processing performed by the embodiment of the smart card personalization system 100 shown in FIGS. 9 and 10. The card issuer management system 950 requests the initiation of the issuing process by sending the smart card personalization system 100 a card framework template record, application program identifier(s), a card operating system identifier, a personalization equipment identifier, and optionally a data format template identifer or a data format template record. In this example, the card issuer management system 950 passes an application resource template record shown below that contains the identifiers The system 100 acquires a data format template using one of the procedures specified above and explained in more detail below in conjunction with the sample card holder data records.
______________________________________
Application Resource Template Record
______________________________________
            A1!
           DFT=CARD1.DFT
           CAT=CARD1.CAT
           CID=CHIPX.CID
           CPT=CARD1.CPT
           SOURCE=A1
______________________________________
The first statement in the record marks the beginning of information for a particular application, in this case application "A1". The next four statements define the identifiers for the card framework template record (DFT), the card application record (CAT), the card operating system record (CID) and the personalization equipment record (CPT). The final statement is the name of a file created by the card issuing management system 950 that contains the card holder data record(s). The card issuing management system 950 inputs the card holder data as either a single request or a `batch` of requests for cards to be issued.
The system 100 retrieves the records corresponding to the identifiers from the database. The system 100 then uses the information contained in the card framework template and data format template to set up an internal "script," which it later interpretes into the specific commands contained in the card operating system and personalization equipment records that instruct the personalization equipment to process the personalization data and issue the card for each card holder.
Two sample card holder data records 952 are shown below.
______________________________________
Cardholder Data Records
______________________________________
Smith,James 12653683091245 0998 041052 mmmm
Anderson,Sue 39485003984138 0297 110248 mmmm
______________________________________
In these records, the format defined by the card issuer places the account name (card holder name) in the first field followed by the account number, expiration data, date of birth, and medical data.
The system 100 uses the data format template to interpret each card holder data record 952 as it is processed. The system 100 also uses the data format template and card application records 922 to validate the data 952 ensuring proper data and format. An example of a data format template corresponding to the format of the sample card holder records shown above is shown in the first line of the table below. The James Smith personalization data record is included in the table to show the correspondence between the data format template and the fields of the card holder data record. The data format template equates each field in the card holder record with an internal label, %1, %2, etc., which corresponds to the internal order used within the system 100.
______________________________________
Data Format Template Record
______________________________________
|  % 1   |   % 2   | % 3 | % 4
| % 5 |
Smith,James 12653683091245 0998 041052 mmmm
______________________________________
The example shown above represents the simplest case in which the fields of a card holder data record 952 are arranged in the internal order used by the smart card personalization system 100. This one-to-one correspondence means that the system 100 does not have to translate the card holder data fields into the internal field order. In such a case, the data format template record is unnecessary. Thus, in a further alternate embodiment, the card issuer does not pass a data format identifier to the smart card personalization system 100, but instead passes an indicator, such as a flag, which informs the system 100 that no data format template is needed because the card holder data fields are in a one-to-one correspondence with the internal field order. The system 100 acts on the indicator by bypassing the translation step.
A more complex example shown next is one in which the fields of the card holder data record 952 and the data within the fields are out of order relative to the internal system order. In this case, translation is necessary.
______________________________________
Cardholder Data in Issuer Format
1234567891245 James Smith 0998 041052 mmmm
Cardholder Data Translated into Internal Format
Smith,James 12653683091245 0998 041052 mmmm
______________________________________
The system 100 uses the data format template to translate the data fields into the internal order as shown above. The translation may result in the physical rearrangement of the data fields or may be a logical rearrangement in which the data format template is invoked as a key each time a field from the card holder data record is referenced by the system 100. Various data format templates designed to translate different arrangements of card holder data will be apparent to those skilled in the art as will the substitution of tables of field equivalences or a set of parsing instructions or other mechanisms for the simple table used above to illustrate this example.
The card framework template record describes the structure of the chip on the card. In the sample shown below, the $MF entry defines a root directory (3F00), while $DF entries define a medical application (5F20), and an accounting application (5F10). Within each directory are application-specific files defined by $EF entries, such as 6F00 containing the account name and 6F10 containing the account number. All file descriptive data resides in the card framework template and is referenced at various times during the smart card issuing process.
______________________________________
Card Framework Template Record
______________________________________
$CHIP=3102,MEM=8192,SIZE=N10
$MF PATH=x3F00,TAG=ROOT,TITLE=`Root Directory`,SIZE=D7194
$DF PATH=x3F005F10,TAG=ACCT,TITLE=`Acct Data`, SIZE=D2048
$DF PATH=x3F005F20,TAG=MED,TITLE=`Medical`,SIZE=D1024
$EF PATH=x3F003100,TAG=ICCID,TITLE=`Issuer
ID`,FORMAT=T,SIZE=D10
$BF PATH=x3F005F205E00,TAG=MED1,TITLE=`Medical
profile`,FORMAT=T,SIZE=D80
$EF PATH=x3F005F106F00,TAG=NAME,TITLE=`Acct
Name`,FORMAT=T,SIZE=A30
$EF PATH=x3F005F106F10,TAG=ACCTID,TITLE=`Account
No.`,FORMAT=T,SIZE=N14
$EF PATH=x3F005F106F20,TAG=EXPIRE,TITLE=Expire
Date`,FORMAT=T,SIZE=N4
$EF PATH=x3F005F106F30,TAG=BIRTH,TITLE=`Account Holder
Birthdate`,FORMAT=T,SIZE=N6
______________________________________
The card application record 922 "maps" the card holder data 952 to the data fields used by the application. The sample card application record 922 shown below has its data entries arranged in the sequence in which they are processed by the smart card personalization system 100.
______________________________________
Card Application Record
______________________________________
$VL ICCID VALUE=1234509876
$VL MED1 %5,TYPE=A
$VL NAME %1,TYPE=A
$VL ACCTID %2,TYPE=N
$VL EXPIRE %3,TYPE=N
$VL BIRTH %4,TYPE=N
$VL FMTACCT %2(1-4)-%2(5-9)-%2(10-14)
______________________________________
The ICCID entry contains the chip identifier. Each of remaining entries, except for FMTACCT, maps a "tag" to the field in the card holder data record 952 that contains the information (as defined in the data format template shown above) and specifies the type of data in the field. Thus, the MED1 tag represents the fifth field in the card holder data record 952 and the data is in alpha format. The FMTACCT entry breaks the second field in the card holder data record 952, i.e., the account number, into sections and inserts hyphens between the sections.
The card operating system record 924 contains the programming control commands necessary to program the chip on the card. The sample card operating system programming control commands shown below are taken from the ISO directive number 7816-4 and are not the internal proprietary commands of any particular card operating system.
______________________________________
Card Operating System Record
______________________________________
          SELECT A0A4000002%F
          WRITE A0D0%O%L%D
          READ A0B0%O%L%D
          RESET VALUE=xFF
______________________________________
Each entry in the example record above contains a tag followed by the corresponding command in the native language of the card operating system. Variable parameter fields are indicated by "%" followed by a letter and are filled in with the appropriate card holder data as each individual card is processed.
The personalization equipment record 926 contains personalization equipment characteristic data, such as instructions that define the actual sequence and steps necessary to issue a complete card on a specific set of personalization equipment. The sample instructions used in this example are fictitious and do not represent the internal proprietary instructions for any particular personalization equipment.
______________________________________
Personalization Equipment Record
______________________________________
$EMBOSS
        #EMB#%FMTACCT% %NAME%
$ENCODE
        #ENC#%%%ACCTID% %NAME%
$IC
        #\@#
        @ICCID
        WRITE ICCID
        @NAME
        SELECT ACCT
        SELECT NAME
        WRITE NAME
        @ACCTID
        SELECT ACCTID
        WRITE ACCTID
        @EXPIRE
        SELECT EXPIRE
        WRITE EXPIRE
$PR
______________________________________
As each card is issued, the personalization equipment characteristic data shown above is serially processed in four steps defined by the entries preceded by a "$." The card application record 922 is used to determine the value of the variable parameter fields in each instruction.
The $EMBOSS instruction is a single stream of data that begins with the control sequence #EMB# which notifies the personalization equipment that the data that follows should be embossed on the card. Each data field in the instruction is enclosed in a pair of percent signs. In this case, the first data field is FMTACCT, or the formatted account field as defined in the card application record 922. The system 100 searches the card application record 922 for the FMTACCT entry and creates the string "1265-36830-91245" from the second data field in the first sample card holder record 952. The next field, NAME, is taken from the first data field in the card holder record 952. Thus, the emboss instruction for the first sample card holder record 952 becomes #EMB%1265-36830-91245%%Smith,James%.
The $ENCODE instruction causes the system 100 to process the card holder data to be encoded on the magnetic stripe of the card in the same fashion as the emboss instruction. Additional control characters in accordance with following IATA (International Air Travel Association) and ISO standards are inserted into the command. The resulting instruction is #ENC#%%%12653683091245%%Smith,James%.
The $IC command specifies the information to be stored in the chip's memory. The card operating system record 924 is used to translate the instructions in the personalization equipment record into the programming control commands for the operating system. A control sequence, #/@#, is used to notify the personalization equipment that the data that follows is chip data. The first field to be stored is the chip identifier, ICCID. The system 100 interprets the WRITE tag in the personalization equipment record 926 in accordance with the command identified with the WRITE tag in the card operating system record 924. Since no offset value is specified in the application record 922 for the chip identifier entry, the default of "0000" is loaded into the %O variable parameter field. The %L variable parameter field is set to the value of the SIZE field in the $CHIP entry in the card framework template, i.e., "10" or hexadecimal "0A." The %D variable parameter field is set to the value of ICCID, "1234509876". The resulting command is A0D000000A1234509876.
The next commands cause the card operating system to store the card holder name into the account name file in the account directory on the chip. The system 100 translates the SELECT ACCT command into the corresponding card operating system command. The system 100 locates the SELECT entry in the card operating system record 924, the ACCT entry in the card framework template record, and substitutes the specified directory path for the account directory defined in the ACCT entry, i.e. "5F10," for the %F variable parameter field in the command defined in the SELECT entry. The resulting command is A0A40000025F10. Similarly, the SELECT NAME command causes the system 100 to substitute the account name file "6F00" for the %F variable parameter field. The resulting command is A0A40000026F00. The final command in this series is the WRITE command. The system 100 interprets the WRITE command by substituting the default offset of "0000" for %O, the value of the SIZE field, "30" or hex "1E," as defined by the NAME entry in the card framework template record for %L, and the card holder's name, "Smith,James" for the first sample card holder data record 952, for %D, to produce the command A0D000001ESmith,James˜˜˜˜˜˜˜.about.˜˜˜˜˜˜˜˜˜˜.about. where each "˜" represents a trailing space inserted to pad the name out to thirty characters.
The system 100 processes the remainder of the commands in the personalization equipment record 926 in a similar fashion to produce a contiguous string of data containing the commands to issue a card for the first sample card holder data record 952:
#/@#A0D000000A123459876A0A40000025F10A0A40000026F00A0D 000001ESmith,James˜˜˜˜˜˜˜˜˜˜˜˜˜˜˜˜˜˜.about.A0A40000026F10A0A40 00002E12653683091245A0A40000026F2040998.
The $PR command causes the system 100 to send the command data stream to the personalization equipment.
The data layouts shown in FIGS. 11, 12 and 13, and the sample data discussed in conjunction with the above example are only examples used to illustrate the functioning of various embodiments of the smart card personalization system 100. That the layouts and data are necessarily defined by the environment in which they are used will be apparent to those skilled in the art.
As will also be apparent to those skilled in the art, the smart card personalization system 100 encompasses alternate embodiments of the software program in which the functions of the system are performed by modules different than those shown in the FIGS. The system 100 may process the data in a serial or parallel fashion, or a combination of the two, without departing from the spirit or scope of the invention. The software program may be written in one of several widely available programming languages and the modules may be coded as subroutines, subsystems, or objects depending on the language chosen. Similarly, data used by the system 100 is described and represented as logical records embodied in a database but the invention is not limited to the described arrangement of data records, nor is the use of any particular type of data management system implied. Relational database systems from vendors such as Oracle, Sybase, Informix, or Microsoft provide the necessary infrastructure for managing the underlying data in the system, whether it is centralized or distributed, but other organizational data structures, i.e., indexed flat files, may be substituted without exceeding the scope of the invention.
Furthermore, alternate embodiments of the invention which implement the system in hardware, firmware, or a combination of both hardware and software, as well as distributing the modules and/or the data in a different fashion will be apparent to those skilled in the art and are also within the scope of the invention.
It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.

Claims (26)

What is claimed is:
1. A method for issuing portable programmed data carriers comprising:
acquiring a personalization equipment identifier and personalization data for a card holder from a card issuer management system;
acquiring equipment characteristic data for a personalization equipment type from a record in a database identified by the personalization equipment identifier; and
transferring the personalization data to personalization equipment as specified by the equipment characteristic data for the type of personalization equipment to issue the data carrier.
2. The method of claim 1, further comprising translating the personalization data into an internal format such that the translated personalization data is transferred to the personalization equipment.
3. The method of claim 2, wherein the personalization data is translated from a format defined by the card issuer management system into the internal format in accordance with format template data.
4. The method of claim 3, further comprising acquiring the format template data from a record in the database identified by a data format identifier supplied by the card issuer management system.
5. The method of claim 3, further comprising acquiring the format template data from the card issuer management system.
6. The method of claim 3, further comprising acquiring the format template data from an application data record in the database identified by an application program identifier supplied by the card issuer management system.
7. The method of claim 1, further comprising:
collecting information regarding the issuing of the data carriers; and
reporting statistics derived from the collected information to the card issuer management system.
8. The method of claim 1, further comprising:
acquiring an application program identifier from the card issuer management system;
acquiring application data from a record in the database identified by the application program identifier; and
transferring the application data to the personalization equipment as specified by the equipment characteristic data.
9. The method of claim 1, further comprising:
acquiring security data from a security source; and
transferring the security data to the personalization equipment as specified by the equipment characteristic data.
10. The method of claim 1, further comprising:
acquiring a card operating system identifier from the card issuer management system;
acquiring programming control commands from a record in the database identified by the operating system identifier; and
transferring the programming control commands to the personalization equipment as specified by the equipment characteristic data.
11. The method of claim 10, further comprising:
acquiring an application program identifier from the card issuer management system;
acquiring the application data from a record in the database identified by the application program identifier; and
transferring the application data to the personalization equipment as specified by the equipment characteristic data.
12. A system for issuing portable programmed data carriers comprising:
a card issuer management system interface for acquiring a personalization equipment identifier and personalization data for a card holder from a card issuer management system;
a personalization equipment interface for acquiring equipment characteristic data for a personalization equipment type from a record in a database identified by the personalization equipment identifier; and
the personalization equipment interface for further transferring the personalization data to personalization equipment as specified by the equipment characteristic data for the type of personalization equipment to issue the data carrier.
13. The system of claim 12, wherein the system further acquires format template data from a record in a database identified by a data format identifier supplied by the card issuer management system and translates the personalization data into an internal format from a format defined by the format template data such that the personalization equipment interface transfers the translated personalization data to the personalization equipment.
14. The system of claim 12, further comprising a tracking/report engine for collecting data from the system regarding the issuing of the data carriers and for reporting the collected data to the card issuer management system.
15. The system of claim 12, further comprising:
a card application interface for acquiring application data from a record in the database identified by an application program identifier acquired by the card issuer management system interface; and
the personalization equipment interface for further transferring the application data to the personalization equipment as specified by the equipment characteristic data.
16. The system of claim 12, further comprising a security manager for acquiring security data from a security source and transferring the security data to the personalization equipment interface.
17. The system of claim 12, further comprising:
a card operating system interface for acquiring programming control commands from a record in a database identified by a card operating system identifier acquired by the card issuer management system interface; and
the personalization equipment interface for further transferring the programming control commands to the personalization equipment as specified by the equipment characteristic data.
18. The system of claim 17, further comprising:
a card application interface for acquiring application data from a record in the database identified by an application program identifier acquired by the card issuer management system interface; and
the personalization equipment interface for further transferring the application data to the personalization equipment as specified by the equipment characteristic data.
19. A data structure stored on a storage device for producing portable programmed data carriers comprising a plurality of personalization equipment elements, wherein each personalization equipment element is addressed by a unique personalization equipment identifier and specifies operating parameters for a type of personalization equipment such that the personalization data is properly formatted for transmission to the personalization equipment used to issue the data carrier.
20. The data structure of claim 19, further comprising a plurality of data format elements, wherein each data format element is addressed by a unique data format identifier and specifies a template used by a card issuer to format personalization data.
21. The data structure of claim 19, further comprising a plurality of card operating system elements, wherein each card operating system element is addressed by a unique card operating system identifier and specifies programming control commands for transmission to the personalization equipment.
22. The data structure of claim 19, further comprising a plurality of application program elements, wherein each application program element is addressed by a unique application program identifier and specifies application data used by a particular type of application program for transmission to the personalization equipment.
23. The data structure of claim 22, further comprising a plurality of card operating system elements, wherein each card operating system element is addressed by a unique card operating system identifier and specifies programming control commands for transmission to the personalization equipment.
24. A system for issuing portable programmed data carriers comprising:
personalization equipment receiving a data stream and in response thereto personalizing portable programmed data carriers;
personalization data obtained from a card issuer management system; and
a smart card personalization system having a database containing one or more data elements selected from the group consisting of
data format template elements,
card application data elements,
card operating system elements,
and personalization equipment elements,
wherein the smart card personalization system outputs the data stream as a result of processing the personalization data as directed by at least one of the selected data elements.
25. A method for issuing portable programmed data carriers comprising:
acquiring personalization data for a card holder and equipment characteristic data; and
transferring the personalization data to personalization equipment as specified by the equipment characteristic data to issue the data carrier.
26. A system for issuing portable programmed data carriers comprising a system interface for acquiring personalization data for a card holder and equipment characteristic data, and for further transferring the personalization data to personalization equipment as specified by the equipment characteristic data to issue the data carrier.
US08/755,459 1996-04-15 1996-11-22 System and apparatus for smart card personalization Expired - Lifetime US5889941A (en)

Priority Applications (31)

Application Number Priority Date Filing Date Title
US08/755,459 US5889941A (en) 1996-04-15 1996-11-22 System and apparatus for smart card personalization
DK03075844T DK1333408T3 (en) 1996-04-15 1997-04-14 Smart Card User Specification System and Device
DK97921189T DK0894312T3 (en) 1996-04-15 1997-04-14 Smart Card User Specification System and Device
AU27298/97A AU717870B2 (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
ES97921189T ES2195139T3 (en) 1996-04-15 1997-04-14 SYSTEM AND DEVICE FOR THE PERSONATION OF SMART CARDS.
CA002251689A CA2251689C (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
JP9537290A JP2000508794A (en) 1996-04-15 1997-04-14 Smart card personalization systems and devices
AT03075844T ATE341052T1 (en) 1996-04-15 1997-04-14 SYSTEM AND DEVICE FOR PERSONALIZING CHIP CARDS
PT97921189T PT894312E (en) 1996-04-15 1997-04-14 SYSTEM AND APPARATUS FOR THE CUSTOMIZATION OF INTELLIGENT CARDS
EP03075844A EP1333408B1 (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
DE69736752T DE69736752T2 (en) 1996-04-15 1997-04-14 System and device for personalizing smart cards
PT03075844T PT1333408E (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
CNB97195304XA CN1187709C (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
DE69720201T DE69720201T2 (en) 1996-04-15 1997-04-14 SYSTEM AND DEVICE FOR CUSTOMIZING CHIP CARDS
BR9708673-8A BR9708673A (en) 1996-04-15 1997-04-14 Process and system for issuing portable programmed data vehicles, and data structure stored in a storage device.
ES03075844T ES2272885T3 (en) 1996-04-15 1997-04-14 SYSTEM AND PERSONALIZATION DEVICE FOR SMART CARDS.
IL12658397A IL126583A (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
AT97921189T ATE235719T1 (en) 1996-04-15 1997-04-14 SYSTEM AND DEVICE FOR PERSONALIZING CHIP CARDS
NZ332406A NZ332406A (en) 1996-04-15 1997-04-14 Personalising smart cards using database of card issuer data format templates
EP06020123A EP1762988A1 (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
EP97921189A EP0894312B1 (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
PCT/US1997/006204 WO1997039424A1 (en) 1996-04-15 1997-04-14 System and apparatus for smart card personalization
US09/126,363 US6202155B1 (en) 1996-11-22 1998-07-30 Virtual card personalization system
US09/139,163 US6014748A (en) 1996-04-15 1998-08-24 System and apparatus for smart card personalization
NO19984821A NO330751B1 (en) 1996-04-15 1998-10-15 Method and system for personalizing a smart card
US09/416,252 US8301300B2 (en) 1996-04-15 1999-10-12 System and method for smart card personalization
HK00100192A HK1021424A1 (en) 1996-04-15 2000-01-12 System and apparatus for smart card personalization.
JP2005243309A JP2006072998A (en) 1996-04-15 2005-08-24 System and apparatus for smart card personalization
US11/626,219 US20070118474A1 (en) 1996-04-15 2007-01-23 System and apparatus for smart card personalization
JP2009272710A JP2010049711A (en) 1996-04-15 2009-11-30 System and apparatus for smart card personalization
US12/987,875 US20110166999A1 (en) 1996-04-15 2011-01-10 System and apparatus for smart card personalization

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US1574396P 1996-04-15 1996-04-15
US08/755,459 US5889941A (en) 1996-04-15 1996-11-22 System and apparatus for smart card personalization

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US09/126,363 Continuation-In-Part US6202155B1 (en) 1996-11-22 1998-07-30 Virtual card personalization system
US09/139,163 Continuation US6014748A (en) 1996-04-15 1998-08-24 System and apparatus for smart card personalization

Publications (1)

Publication Number Publication Date
US5889941A true US5889941A (en) 1999-03-30

Family

ID=26687742

Family Applications (5)

Application Number Title Priority Date Filing Date
US08/755,459 Expired - Lifetime US5889941A (en) 1996-04-15 1996-11-22 System and apparatus for smart card personalization
US09/139,163 Expired - Lifetime US6014748A (en) 1996-04-15 1998-08-24 System and apparatus for smart card personalization
US09/416,252 Expired - Fee Related US8301300B2 (en) 1996-04-15 1999-10-12 System and method for smart card personalization
US11/626,219 Abandoned US20070118474A1 (en) 1996-04-15 2007-01-23 System and apparatus for smart card personalization
US12/987,875 Abandoned US20110166999A1 (en) 1996-04-15 2011-01-10 System and apparatus for smart card personalization

Family Applications After (4)

Application Number Title Priority Date Filing Date
US09/139,163 Expired - Lifetime US6014748A (en) 1996-04-15 1998-08-24 System and apparatus for smart card personalization
US09/416,252 Expired - Fee Related US8301300B2 (en) 1996-04-15 1999-10-12 System and method for smart card personalization
US11/626,219 Abandoned US20070118474A1 (en) 1996-04-15 2007-01-23 System and apparatus for smart card personalization
US12/987,875 Abandoned US20110166999A1 (en) 1996-04-15 2011-01-10 System and apparatus for smart card personalization

Country Status (17)

Country Link
US (5) US5889941A (en)
EP (1) EP0894312B1 (en)
JP (3) JP2000508794A (en)
CN (1) CN1187709C (en)
AT (2) ATE341052T1 (en)
AU (1) AU717870B2 (en)
BR (1) BR9708673A (en)
CA (1) CA2251689C (en)
DE (2) DE69736752T2 (en)
DK (1) DK0894312T3 (en)
ES (2) ES2272885T3 (en)
HK (1) HK1021424A1 (en)
IL (1) IL126583A (en)
NO (1) NO330751B1 (en)
NZ (1) NZ332406A (en)
PT (2) PT1333408E (en)
WO (1) WO1997039424A1 (en)

Cited By (143)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5942738A (en) * 1995-05-30 1999-08-24 Syseca S.A. Smart IC card system and smart IC card with transaction management program stored therein
US5969318A (en) * 1997-11-24 1999-10-19 Mackenthun; Holger Gateway apparatus for designing and issuing multiple application cards
WO1999057675A1 (en) * 1998-05-06 1999-11-11 American Express Travel Related Services Company, Inc. Methods and apparatus for dynamic smartcard synchronization and personalization
US5987612A (en) * 1996-12-06 1999-11-16 Nippon Telegraph And Telephone Corporation Internet accessing system using card readers and dual cards with information pertaining to log on
US6014748A (en) * 1996-04-15 2000-01-11 Ubiq Incorporated System and apparatus for smart card personalization
US6157966A (en) * 1997-06-30 2000-12-05 Schlumberger Malco, Inc. System and method for an ISO7816 complaint smart card to become master over a terminal
WO2001001622A2 (en) * 1999-06-28 2001-01-04 Starpay.Com, Inc. Apparatus and method for performing secure network transactions
US6196459B1 (en) * 1998-05-11 2001-03-06 Ubiq Incorporated Smart card personalization in a multistation environment
US6202155B1 (en) * 1996-11-22 2001-03-13 Ubiq Incorporated Virtual card personalization system
DE19958559A1 (en) * 1999-12-04 2001-06-07 Orga Kartensysteme Gmbh Method for initializing and / or personalizing chip cards and a corresponding device
GB2358500A (en) * 2000-01-19 2001-07-25 Softcard Solutions Ltd Programming data carriers
US6283368B1 (en) * 1997-07-29 2001-09-04 Gilles Leroux S.A. High speed customizing machine
WO2001078020A1 (en) 2000-04-11 2001-10-18 Visa International Service Association Integrated production of smart cards
US6308317B1 (en) * 1996-10-25 2001-10-23 Schlumberger Technologies, Inc. Using a high level programming language with a microcontroller
US6308270B1 (en) 1998-02-13 2001-10-23 Schlumberger Technologies, Inc. Validating and certifying execution of a software program with a smart card
US6317832B1 (en) * 1997-02-21 2001-11-13 Mondex International Limited Secure multiple application card system and process
US20010054148A1 (en) * 2000-02-18 2001-12-20 Frank Hoornaert Field programmable smart card terminal and token device
EP1170694A2 (en) * 2000-07-06 2002-01-09 Hitachi, Ltd. Identification code management method and system
WO2002015077A1 (en) * 2000-08-14 2002-02-21 Starpay.Com, Inc. Apparatus and method for performing secure network transactions
US6367011B1 (en) 1997-10-14 2002-04-02 Visa International Service Association Personalization of smart cards
US6402028B1 (en) 1999-04-06 2002-06-11 Visa International Service Association Integrated production of smart cards
US20020129261A1 (en) * 2001-03-08 2002-09-12 Cromer Daryl Carvis Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens
US6453414B1 (en) 1998-07-23 2002-09-17 Samsung Electronics Co., Ltd. Computer system with PC cards and method of booting the same
US20020138759A1 (en) * 2001-03-26 2002-09-26 International Business Machines Corporation System and method for secure delivery of a parcel or document
US20020151330A1 (en) * 2001-04-17 2002-10-17 Claude Fouque System with IC card deactivation before a hardware reset
US20020165906A1 (en) * 2000-09-14 2002-11-07 Glenn Ricart Method and system for computer personalization
US20020180993A1 (en) * 1999-05-07 2002-12-05 Klinefelter Gary M. Identification card printer having multiple controllers
US6513721B1 (en) * 2000-11-27 2003-02-04 Microsoft Corporation Methods and arrangements for configuring portable security token features and contents
US6575372B1 (en) * 1997-02-21 2003-06-10 Mondex International Limited Secure multi-application IC card system having selective loading and deleting capability
US6575360B1 (en) * 1997-05-15 2003-06-10 Betaresearch Device and method for personalizing chip cards
WO2003052673A1 (en) * 2001-12-17 2003-06-26 Koninklijke Philips Electronics N.V. Communication station for inventorizing transponders by means of selectable memory areas of the transponders
US6591229B1 (en) 1998-10-09 2003-07-08 Schlumberger Industries, Sa Metrology device with programmable smart card
US6588673B1 (en) * 2000-02-08 2003-07-08 Mist Inc. Method and system providing in-line pre-production data preparation and personalization solutions for smart cards
US6592042B1 (en) * 1998-02-13 2003-07-15 Schlumberger Systemes Method for making a card with integrated circuit
US6632250B1 (en) * 1998-09-11 2003-10-14 Datacard Corporation Method and system for creating a card
US20030201317A1 (en) * 2002-01-28 2003-10-30 Brian Shay Card personalization system and method
US20030216826A1 (en) * 2002-03-01 2003-11-20 Fargo Electronics, Inc. Identification card manufacturing security
US6662999B1 (en) * 2002-02-26 2003-12-16 Connecticut General Life Insurance, Co. System and method for generating an identification card
US20040015612A1 (en) * 2000-09-05 2004-01-22 Sven Gossel Method for producing chips, especially for sim cards, in a series
US20040015379A1 (en) * 2002-05-31 2004-01-22 David Mee Raising an alert
US6715078B1 (en) 2000-03-28 2004-03-30 Ncr Corporation Methods and apparatus for secure personal identification number and data encryption
US20040144838A1 (en) * 2001-04-10 2004-07-29 Laurent Lagosanto Method and system for managing data designed to be stored in a programmable smart card
US20040160624A1 (en) * 2003-02-18 2004-08-19 Adam Elgar Apparatus and method for manipulating images
US6786418B1 (en) * 1998-11-05 2004-09-07 Gemplus Smart card customizing system
US6796494B1 (en) 1999-06-18 2004-09-28 Steven M. Gonzalo Method and system for configuring a publicly accessible computer system
US20040210566A1 (en) * 2003-04-21 2004-10-21 Visa International Service Association Smart card personalization assistance tool
US20040236624A1 (en) * 2003-05-22 2004-11-25 International Business Machines Corporation Method and apparatus for targeted marketing in embedded chip post issuance transactions
US6834795B1 (en) * 2001-06-29 2004-12-28 Sun Microsystems, Inc. Secure user authentication to computing resource via smart card
US20050006460A1 (en) * 2002-09-20 2005-01-13 Datacard Corporation Remote personalization and issuance of identity documents
US20050137737A1 (en) * 2003-12-19 2005-06-23 Akiko Sato Integrated circuit card system and application loading method
US20050139650A1 (en) * 1999-09-20 2005-06-30 Gonzalo Steven M. Method and system for configuring a publicly accessible computer system
US20050160281A1 (en) * 2001-07-25 2005-07-21 Seagate Technology Llc System and method for delivering versatile security, digital rights management, and privacy services
US20050167487A1 (en) * 2004-02-02 2005-08-04 Conlon Jennifer L. System and method for customizing designs for credit cards, ATM/debit cards, checks, gift cards, and membership cards
US20050257253A1 (en) * 2004-05-03 2005-11-17 Fargo Electronics, Inc Managed credential issuance
US6971025B1 (en) * 1999-08-19 2005-11-29 International Business Machines Corporation Secure personalization of chip cards
US20060000892A1 (en) * 2004-07-01 2006-01-05 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US20060016870A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US20060016877A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Biometric safeguard method with a smartcard
US20060037065A1 (en) * 2002-03-01 2006-02-16 Fargo Electronics, Inc. Prevention of unauthorized credential production in a credential production system
US7020872B1 (en) * 1999-07-01 2006-03-28 Cp8 Technologies Method for verifying code transformers for an incorporated system, in particular in a chip card
US20060074718A1 (en) * 2004-05-20 2006-04-06 Idexx Laboratories, Inc. Portable veterinary medical record apparatus and method of use
US20060074713A1 (en) * 2004-10-04 2006-04-06 Conry Anne M Patient identification card system and method for efficient medical care
US20060161594A1 (en) * 2005-01-19 2006-07-20 Samsung Electronics Co., Ltd. Method and apparatus for improving data processing speed through storage of record information of identity module
US20060174352A1 (en) * 2001-07-25 2006-08-03 Seagate Technology Llc Method and apparatus for providing versatile services on storage devices
US7092935B2 (en) * 2000-02-25 2006-08-15 Canon Kabushiki Kaisha Customizable filter interface
US20070036516A1 (en) * 2005-08-11 2007-02-15 The Directtv Group, Inc. Secure delivery of program content via a removable storage medium
US20070043684A1 (en) * 2005-08-18 2007-02-22 Fargo Electronics, Inc. Central Management of a Credential Production System
US7203311B1 (en) 2000-07-21 2007-04-10 The Directv Group, Inc. Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
US20070118479A1 (en) * 2005-11-18 2007-05-24 Xerox Corporation System and method for controlling access to personal identification information contained in documents
US20070118770A1 (en) * 2000-07-21 2007-05-24 Kahn Raynold M Secure storage and replay of media programs using a hard-paired receiver and storage device
US7232073B1 (en) * 2004-12-21 2007-06-19 Sun Microsystems, Inc. Smart card with multiple applications
US20070187516A1 (en) * 2005-06-20 2007-08-16 Rotuba Extruders, Inc. Scented authorization card and method of manufacture
US20070246526A1 (en) * 2004-02-17 2007-10-25 Serverside Group Limited Apparatus and Method for Production of Transaction Cards
US20070250710A1 (en) * 2006-04-25 2007-10-25 Seagate Technology Llc Versatile secure and non-secure messaging
US20070250915A1 (en) * 2006-04-25 2007-10-25 Seagate Technology Llc Versatile access control system
US20070251993A1 (en) * 2004-12-14 2007-11-01 Toshimichi Masuta Rfid Card Issuing System
US20070265968A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems
US20070265967A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems
US20070265970A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems
US20070265973A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to protect content in home networks
US20070265966A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Content delivery systems and methods to operate the same
US20070266414A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to provide content on demand in content broadcast systems
US20070265978A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US7314164B2 (en) 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US20080005559A1 (en) * 2006-04-19 2008-01-03 Stepnexus Holdings Methods and systems for ic card application loading
US7325724B2 (en) 2004-07-01 2008-02-05 American Express Travel Related Services Company, Inc. Method for registering a biometric for use with a smartcard
US20080037900A1 (en) * 2006-08-08 2008-02-14 Serverside Group Limited Affinity group
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US20080065537A1 (en) * 1996-05-10 2008-03-13 Barcelou David M Automated transaction machine
US7363504B2 (en) 2004-07-01 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for keystroke scan recognition biometrics on a smartcard
US20080126398A1 (en) * 2006-06-29 2008-05-29 Incard S.A. Method for Configuring an IC Card in Order to Receive Personalization Commands
US7409562B2 (en) 2001-09-21 2008-08-05 The Directv Group, Inc. Method and apparatus for encrypting media programs for later purchase and viewing
US20080265020A1 (en) * 2007-02-09 2008-10-30 Business Intelligent Processing Systems Plc System and method for performing payment transactions, verifying age, verifying identity, and managing taxes
US20080301461A1 (en) * 2007-05-31 2008-12-04 Vasco Data Security International, Inc. Remote authentication and transaction signatures
US20080313205A1 (en) * 2004-03-29 2008-12-18 Serverside Group Limited Card Design System
US20080308636A1 (en) * 2007-06-13 2008-12-18 William Lynch System and methods for creating a user customized bank card
US7505941B2 (en) 1999-08-31 2009-03-17 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions using biometrics
WO2007044259A3 (en) * 2005-10-04 2009-04-16 First Data Corp Systems and methods for personalizing transaction cards
US7588180B1 (en) 2000-01-28 2009-09-15 International Apparel Group, Llc Multi-application smart card with currency exchange, location tracking, and personal identification capabilities
US20090235109A1 (en) * 2006-04-25 2009-09-17 Seagate Technology Llc Hybrid computer security clock
US20090235037A1 (en) * 2006-11-07 2009-09-17 Oberthur Technologies Method and device for customizing a portable electronic entity
WO2009126630A1 (en) * 2008-04-09 2009-10-15 Visa U.S.A. Inc. Customer exclusive data
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US20100058365A1 (en) * 2007-02-14 2010-03-04 Datacard Corporation Framework for enhanced production of personalized documents
US7690577B2 (en) 2001-07-10 2010-04-06 Blayn W Beenau Registering a biometric for radio frequency transactions
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US20100257099A1 (en) * 2001-07-10 2010-10-07 American Express Travel Related Services Company, Inc. System and method for dynamic fob synchronization and personalization
US7814332B2 (en) 2001-07-10 2010-10-12 Blayn W Beenau Voiceprint biometrics on a payment device
US20100325039A1 (en) * 2009-04-28 2010-12-23 Mastercard International Incorporated Apparatus, method, and computer program product for encoding enhanced issuer information in a card
US20110000386A1 (en) * 2007-08-01 2011-01-06 Dynamic Solutions International Real time card printing systems and methods
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US7988038B2 (en) 2001-07-10 2011-08-02 Xatra Fund Mx, Llc System for biometric security using a fob
US20110191248A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US8099187B2 (en) 2005-08-18 2012-01-17 Hid Global Corporation Securely processing and tracking consumable supplies and consumable material
USRE43157E1 (en) 2002-09-12 2012-02-07 Xatra Fund Mx, Llc System and method for reassociating an account number to another transaction account
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US8289136B2 (en) 2001-07-10 2012-10-16 Xatra Fund Mx, Llc Hand geometry biometrics on a payment device
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
EP2555174A1 (en) 2011-08-04 2013-02-06 Giesecke & Devrient GmbH Method and system for issuing portable data carriers
US8397376B2 (en) 2010-08-26 2013-03-19 CPI Card Group—Colorado, Inc. System for automated production processing of smart cards
US8667285B2 (en) 2007-05-31 2014-03-04 Vasco Data Security, Inc. Remote authentication and transaction signatures
US20150039492A1 (en) * 2013-07-31 2015-02-05 Mastercard International Incorporated Change on card method and apparatus
WO2015047192A1 (en) * 2013-09-24 2015-04-02 Mastercard Asia Pacific Pte. Ltd. A method for electrically personalizing a payment chip and a payment chip
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US9178693B2 (en) 2006-08-04 2015-11-03 The Directv Group, Inc. Distributed media-protection systems and methods to operate the same
US9225761B2 (en) 2006-08-04 2015-12-29 The Directv Group, Inc. Distributed media-aggregation systems and methods to operate the same
US20160030193A1 (en) * 2002-04-23 2016-02-04 Spinecore, Inc. Artificial disc replacements with natural kinematics
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
AP3963A (en) * 2011-09-14 2016-12-24 Infosys Ltd A method and system for securing data on a financial transaction instrument
US9607189B2 (en) 2015-01-14 2017-03-28 Tactilis Sdn Bhd Smart card system comprising a card and a carrier
US20180130049A1 (en) * 2016-11-08 2018-05-10 Jason Michael Busch Card with information features and methods of making the same
US10037528B2 (en) 2015-01-14 2018-07-31 Tactilis Sdn Bhd Biometric device utilizing finger sequence for authentication
US10284528B2 (en) 2015-06-25 2019-05-07 Entrust Datacard Corporation Remote monitoring and management of an instant issuance system
US20190197525A1 (en) * 2017-12-21 2019-06-27 Entrust Datacard Corporation Secure end-to-end personalization of smart cards
US10353645B2 (en) 2011-07-01 2019-07-16 Entrust Datacard Corporation User interface for a customized personalization document printer of an instant issuance system
US10395227B2 (en) 2015-01-14 2019-08-27 Tactilis Pte. Limited System and method for reconciling electronic transaction records for enhanced security
US10839388B2 (en) 2001-07-10 2020-11-17 Liberty Peak Ventures, Llc Funding a radio frequency device transaction
US11049372B2 (en) 2007-06-13 2021-06-29 CPI Card Group—Colorado, Inc. System and methods for generating user interfaces for custom card design session
US11354650B2 (en) 2019-12-16 2022-06-07 Mastercard International Incorporated Payment card asset construction service

Families Citing this family (109)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6118492A (en) * 1996-08-14 2000-09-12 Starsight Telecast, Inc. Guide system and method of operation
US6230267B1 (en) * 1997-05-15 2001-05-08 Mondex International Limited IC card transportation key set
GB2326010A (en) * 1997-06-07 1998-12-09 Ibm Data processing system using active tokens
EP0895204B1 (en) * 1997-08-01 2003-12-10 Kabushiki Kaisha Toshiba IC card issuing system and IC card issuing method
US6192436B1 (en) * 1998-09-18 2001-02-20 Xilinx Inc. System and method for configuration of electronic devices using a smart card which having configuration data stored therein
US6195700B1 (en) * 1998-11-20 2001-02-27 International Business Machines Corporation Application protocol data unit management facility
DE19858343A1 (en) * 1998-12-17 2000-06-21 Giesecke & Devrient Gmbh Method and device for producing personalized chip cards
US6687714B1 (en) * 1999-03-01 2004-02-03 Citicorp Development Center, Inc. Method and system for managing transaction card data
WO2001054086A1 (en) * 2000-01-19 2001-07-26 Softcard Solutions Limited Programming data carriers
US8429041B2 (en) * 2003-05-09 2013-04-23 American Express Travel Related Services Company, Inc. Systems and methods for managing account information lifecycles
US8543423B2 (en) * 2002-07-16 2013-09-24 American Express Travel Related Services Company, Inc. Method and apparatus for enrolling with multiple transaction environments
US7493497B1 (en) * 2000-02-03 2009-02-17 Integrated Information Solutions Digital identity device
US6912578B1 (en) * 2000-02-25 2005-06-28 Sun Microsystems, Inc. Method and apparatus for improving utilization of a resource on a shared client
US8121941B2 (en) 2000-03-07 2012-02-21 American Express Travel Related Services Company, Inc. System and method for automatic reconciliation of transaction account spend
US7627531B2 (en) * 2000-03-07 2009-12-01 American Express Travel Related Services Company, Inc. System for facilitating a transaction
US7356505B2 (en) * 2000-06-06 2008-04-08 Universal Transactions Systems Limited System and method for transferring funds
FR2809847B1 (en) * 2000-06-06 2002-08-30 Gemplus Card Int METHOD FOR ELECTRICAL CUSTOMIZATION OF CHIP CARD
US20090150294A1 (en) * 2000-06-06 2009-06-11 March Albert D Systems and methods for authenticating financial transactions involving financial cards
JP4577950B2 (en) * 2000-06-23 2010-11-10 大日本印刷株式会社 Non-contact type IC card issuance processing system
AU6725601A (en) * 2000-07-11 2002-01-21 Kaba Schliesssysteme Ag Method for the initialisation of mobile data supports
JP2002041695A (en) * 2000-07-27 2002-02-08 Hitachi Ltd Method for issuing certificate, method for confiring certificate and certificate issuing center system
WO2002023452A1 (en) * 2000-09-12 2002-03-21 American Express Travel Related Services Company, Inc. Microchip-enabled online transaction system
US20020099473A1 (en) * 2000-11-08 2002-07-25 Paul Amadeo Integrated computer-aided design (CAD) and robotic systems for rapid prototyping and manufacture of smart cards
US6729549B2 (en) * 2000-12-19 2004-05-04 International Business Machines Corporation System and method for personalization of smart cards
US7191938B2 (en) * 2000-12-26 2007-03-20 Dynamic Solutions International Corporation Systems and methods for enterprise based issuance of identification cards
US7757094B2 (en) * 2001-02-27 2010-07-13 Qualcomm Incorporated Power management for subscriber identity module
US7137003B2 (en) * 2001-02-27 2006-11-14 Qualcomm Incorporated Subscriber identity module verification during power management
US6655587B2 (en) * 2001-03-21 2003-12-02 Cubic Corporation Customer administered autoload
US7134134B2 (en) * 2001-03-24 2006-11-07 Microsoft Corporation Electronic program guide hardware card
US20020143901A1 (en) * 2001-04-03 2002-10-03 Gtech Rhode Island Corporation Interactive media response processing system
DE10123664A1 (en) * 2001-05-15 2002-11-21 Giesecke & Devrient Gmbh Method for generating a signature code for a signature card uses a code-generating unit and a signature card to create a secrete code as well as a session code and encoded transmission of the generated code to the signature card.
US7542942B2 (en) * 2001-07-10 2009-06-02 American Express Travel Related Services Company, Inc. System and method for securing sensitive information during completion of a transaction
FR2826747B1 (en) * 2001-07-02 2005-02-25 Gemplus Card Int METHOD AND DEVICE FOR PROCESSING DATA FOR CUSTOMIZING AN APPLICATION ON A PORTABLE COMMUNICATOR DEVICE, FOR EXAMPLE A CHIP CARD
US7503480B2 (en) * 2001-07-10 2009-03-17 American Express Travel Related Services Company, Inc. Method and system for tracking user performance
US20090008441A1 (en) * 2001-07-10 2009-01-08 Xatra Fund Mx, Llc Tracking rf transaction activity using a transaction device identifier
US8635131B1 (en) 2001-07-10 2014-01-21 American Express Travel Related Services Company, Inc. System and method for managing a transaction protocol
US7805378B2 (en) 2001-07-10 2010-09-28 American Express Travel Related Servicex Company, Inc. System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions
US8960535B2 (en) * 2001-07-10 2015-02-24 Iii Holdings 1, Llc Method and system for resource management and evaluation
US7996324B2 (en) * 2001-07-10 2011-08-09 American Express Travel Related Services Company, Inc. Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia
US7925535B2 (en) 2001-07-10 2011-04-12 American Express Travel Related Services Company, Inc. System and method for securing RF transactions using a radio frequency identification device including a random number generator
FR2828358B1 (en) * 2001-08-02 2004-01-16 Gemplus Card Int METHOD AND DEVICE FOR COMPATIBILITY OF COMMUNICATION ON A NETWORK OF TERMINALS, FOR EXAMPLE TO ENABLE A DIALOGUE WITH AN APPLICATION ON A CHIP CARD
JP2003058829A (en) * 2001-08-16 2003-02-28 Konica Corp Id card preparation system
US7162736B2 (en) 2001-08-20 2007-01-09 Schlumberger Omnes, Inc. Remote unblocking with a security agent
DK1430448T3 (en) * 2001-08-24 2007-04-23 Cubic Corp Universal ticket transport unit
EP1347373A3 (en) * 2002-03-20 2005-02-02 Seiko Epson Corporation Apparatus for processing instructions of different instruction set architectures
EP1515266A4 (en) * 2002-06-14 2008-03-05 Jcb Co Ltd Card issuing system and card issuing method
US8010405B1 (en) 2002-07-26 2011-08-30 Visa Usa Inc. Multi-application smart card device software solution for smart cardholder reward selection and redemption
US7774273B2 (en) 2002-07-30 2010-08-10 Acs State & Local Solutions, Inc. Systems and methods for processing benefits
US9852437B2 (en) 2002-09-13 2017-12-26 Visa U.S.A. Inc. Opt-in/opt-out in loyalty system
US8015060B2 (en) 2002-09-13 2011-09-06 Visa Usa, Inc. Method and system for managing limited use coupon and coupon prioritization
US8626577B2 (en) 2002-09-13 2014-01-07 Visa U.S.A Network centric loyalty system
US7534476B2 (en) * 2002-09-16 2009-05-19 Avery Dennison Corporation Identification badge construction
US7172113B2 (en) * 2002-09-16 2007-02-06 Avery Dennison Corporation System and method for creating a display card
US7587434B2 (en) 2002-10-01 2009-09-08 Acs State & Local Solutions, Inc. Method and system for managing a distributed transaction process
US8340979B2 (en) 2002-10-01 2012-12-25 Acs State & Local Solutions, Inc. Systems and methods for electronically processing government sponsored benefits
US6718871B1 (en) * 2003-01-14 2004-04-13 Hewlett-Packard Development Company, L.P. Providing printing and embossing data over a single data path
GB0305806D0 (en) * 2003-03-13 2003-04-16 Ecebs Ltd Smartcard based value transfer
US20040193759A1 (en) * 2003-03-31 2004-09-30 Scott Roger M. Method and system for providing a smart card scripting tool
US7827077B2 (en) 2003-05-02 2010-11-02 Visa U.S.A. Inc. Method and apparatus for management of electronic receipts on portable devices
US8554610B1 (en) 2003-08-29 2013-10-08 Visa U.S.A. Inc. Method and system for providing reward status
US7051923B2 (en) 2003-09-12 2006-05-30 Visa U.S.A., Inc. Method and system for providing interactive cardholder rewards image replacement
EP1668599A1 (en) * 2003-09-22 2006-06-14 Cubic Corporation Mass transit bus fare box
US8005763B2 (en) 2003-09-30 2011-08-23 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US8407083B2 (en) 2003-09-30 2013-03-26 Visa U.S.A., Inc. Method and system for managing reward reversal after posting
US7653602B2 (en) 2003-11-06 2010-01-26 Visa U.S.A. Inc. Centralized electronic commerce card transactions
CH716409B1 (en) * 2003-11-12 2021-01-29 Legic Identsystems Ag Method for writing a data organization in identification media and for writing and executing applications in the data organization.
US7070100B2 (en) * 2003-11-18 2006-07-04 Datacard Corporation Desktop card printer with embedded PCL, Telnet, and USB hub and method for using same
US8918900B2 (en) * 2004-04-26 2014-12-23 Ivi Holdings Ltd. Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport
US7472827B2 (en) 2004-05-17 2009-01-06 American Express Travel Related Services Company, Inc. Limited use PIN system and method
EP1774497A1 (en) * 2004-07-15 2007-04-18 Avery Dennison Corporation Organisation Printing stock with a label for making a security badge
WO2006044940A2 (en) * 2004-10-19 2006-04-27 Veritec, Inc. Secure cards and methods
DE102004058020A1 (en) * 2004-12-01 2006-06-08 Siemens Ag Method for personalizing smart cards
US7290705B1 (en) 2004-12-16 2007-11-06 Jai Shin System and method for personalizing and dispensing value-bearing instruments
DE102005052888A1 (en) * 2005-11-07 2007-05-16 Giesecke & Devrient Gmbh Portable data storage medium personalizing method, involves receiving response data of processing device from personalization system, and carrying out personalization step based on response data that are determined based on detected data
US7844829B2 (en) * 2006-01-18 2010-11-30 Sybase, Inc. Secured database system with built-in antivirus protection
DE102006021382B4 (en) * 2006-05-08 2015-08-20 Giesecke & Devrient Gmbh Personalization of portable data carriers
US7967194B2 (en) * 2006-05-17 2011-06-28 Mastercard International Incorporated Centralized issuer hub for transaction card customization
WO2008003772A1 (en) * 2006-07-07 2008-01-10 Gemplus Device and method for personalising a portable electronic device
EP1936574A1 (en) * 2006-12-01 2008-06-25 Cassis International PTE Ltd. CAP file for the personalisation of a Java application
US20090006439A1 (en) * 2007-06-26 2009-01-01 General Electric Company Smart, secured remote patient registration workflow systems and methods using a kiosk model
EP2206277A4 (en) 2007-10-22 2013-02-13 Microlatch Pty Ltd A transmitter for transmitting a secure access signal
US20090108055A1 (en) * 2007-10-26 2009-04-30 Microsoft Corporation Personalizable cards shared via a computerized card service
US8681991B2 (en) * 2008-04-01 2014-03-25 Kaba Ag System and method for providing user media
US20110264926A1 (en) * 2008-09-12 2011-10-27 Guthery Scott B Use of a secure element for writing to and reading from machine readable credentials
US9032058B2 (en) * 2009-03-13 2015-05-12 Assa Abloy Ab Use of SNMP for management of small footprint devices
US20100235900A1 (en) * 2009-03-13 2010-09-16 Assa Abloy Ab Efficient two-factor authentication
KR101122470B1 (en) * 2009-06-08 2012-02-29 에스케이플래닛 주식회사 System and method for distinguishing electronic money of muiti type, apparatus applied to the same
US20110145082A1 (en) 2009-12-16 2011-06-16 Ayman Hammad Merchant alerts incorporating receipt data
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts
EP2558997A4 (en) * 2010-04-13 2016-01-20 Mastercard International Inc Method and apparatus for global replacement card services
GB2480431A (en) * 2010-05-14 2011-11-23 Giesecke & Devrient Gb Ltd Personalising portable data carriers using unique identifiers for data
GB2480429A (en) * 2010-05-14 2011-11-23 Giesecke & Devrient Gb Ltd Personalising portable data carriers by use of a data preparation parameter
GB2480430A (en) * 2010-05-14 2011-11-23 Giesecke & Devrient Gb Ltd Personalising portable data carriers using encrypted data transfer
CN102088349B (en) * 2010-12-27 2013-07-10 深圳市国民电子商务有限公司 Personalized method and system of intelligent card
US8733645B2 (en) * 2011-10-28 2014-05-27 Lg Cns Co., Ltd. Unified transportation payment system
CN102693455B (en) * 2012-05-04 2016-09-14 武汉天喻信息产业股份有限公司 A kind of data based on financial IC card prepare fully automatic system and method
CN103426238B (en) * 2012-05-23 2017-02-15 中兴通讯股份有限公司 Smart cart issuing system and method based on plug-ins
FR2999003B1 (en) * 2012-11-30 2015-01-09 Oberthur Technologies METHOD FOR CUSTOMIZING ELECTRONIC CHIPS AND CORRESPONDING CUSTOMIZATION PLATFORM
CN103281219B (en) * 2013-06-04 2016-08-10 东信和平科技股份有限公司 A kind of monitor the method and device that ISOIEC7816-3 interface data is mutual
CN103544454B (en) * 2013-10-12 2017-04-26 东信和平科技股份有限公司 Script processing based personalized smart-card issuing method, device and system
US8886570B1 (en) * 2013-10-29 2014-11-11 Quisk, Inc. Hacker-resistant balance monitoring
CN103559464B (en) * 2013-10-31 2016-08-24 东信和平科技股份有限公司 Social security IC-card personalization method, Apparatus and system
JP2016207069A (en) * 2015-04-27 2016-12-08 株式会社東芝 Ic card issuance data processor, ic card issuance data generating program and ic card issuance data generating method
CN105160585A (en) * 2015-08-18 2015-12-16 珠海保税区星汉智能卡股份有限公司 Cross-platform smart card personalized production system and control method
CN105391541B (en) * 2015-09-30 2019-02-19 金邦达有限公司 A kind of card personalization data processing equipment and method
WO2017166101A1 (en) * 2016-03-30 2017-10-05 李昕光 Card manufacturing system
CN108123795B (en) 2016-11-28 2020-01-10 广东国盾量子科技有限公司 Quantum key chip issuing method, application method, issuing platform and system
IT201900017561A1 (en) * 2019-09-30 2021-03-30 St Microelectronics Srl "Process for introducing personalization data into non-volatile memories of a plurality of integrated circuits, in particular in integrated circuit cards, corresponding system and computer product"
DE202022101609U1 (en) 2022-03-28 2022-04-13 Sarkar Manash Blockchain-enabled wearable device for public distribution centers

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4772782A (en) * 1984-12-28 1988-09-20 Bull S.A. Method of personalizing portable media such as credit cards
US4825054A (en) * 1988-02-16 1989-04-25 Datacard Corporation Method and apparatus for parallel integrated circuit card initialization and embossing
US4827425A (en) * 1986-10-31 1989-05-02 Thorn Emi Malco, Incorporated System for personalization of integrated circuit microchip cards
US4866259A (en) * 1986-08-08 1989-09-12 Bonnemoy Marc A Equipment for automatic personalizing of credit cards
US4874935A (en) * 1986-03-10 1989-10-17 Data Card Coprporation Smart card apparatus and method of programming same
US4882474A (en) * 1986-05-16 1989-11-21 American Telephone And Telegraph Company Security file system and method for securing data in a portable data carrier
US5025399A (en) * 1988-09-23 1991-06-18 Datacard Corporation Method and apparatus for personalizing plastic cards
US5266781A (en) * 1991-08-15 1993-11-30 Datacard Corporation Modular card processing system
US5332889A (en) * 1992-12-18 1994-07-26 Datacard Corporation Integrated circuit card programming device
US5442165A (en) * 1992-10-15 1995-08-15 Oki Electric Industry Co., Ltd. Secure IC card system with reusable prototype IC card
US5534857A (en) * 1991-11-12 1996-07-09 Security Domain Pty. Ltd. Method and system for secure, decentralized personalization of smart cards
US5578808A (en) * 1993-12-22 1996-11-26 Datamark Services, Inc. Data card that can be used for transactions involving separate card issuers
US5684742A (en) * 1995-09-20 1997-11-04 International Business Machines Corporation Device and method for the simplified generation of tools for the initialization and personalization of and communication with a chip card

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4742215A (en) 1986-05-07 1988-05-03 Personal Computer Card Corporation IC card system
JPS6356785A (en) 1986-08-28 1988-03-11 Toshiba Corp Portable storage medium processor
JPS63197293A (en) 1987-02-12 1988-08-16 Toshiba Corp Ic card issuing system
JPS63231692A (en) 1987-03-20 1988-09-27 Mitsubishi Electric Corp Secret code writer
US4747706A (en) 1987-08-17 1988-05-31 Datacard Corporation Embossing method and apparatus
US4837422A (en) * 1987-09-08 1989-06-06 Juergen Dethloff Multi-user card system
US4968873A (en) * 1987-09-08 1990-11-06 Juergen Dethloff Smart card issuing and receiving apparatus
JPH0668878B2 (en) 1987-10-19 1994-08-31 富士通機電株式会社 Magnetic card issuing device
FR2638002A1 (en) 1988-08-26 1990-04-20 Unidel Securite Personalising method for microcomputer cards and system for implementing it
JPH02118869A (en) 1988-10-28 1990-05-07 Tokyo Electric Co Ltd Data processing system
JP2703957B2 (en) 1988-11-30 1998-01-26 株式会社東芝 Recording device and recording method for portable medium
US5065429A (en) * 1989-04-03 1991-11-12 Lang Gerald S Method and apparatus for protecting material on storage media
DK279089D0 (en) 1989-06-07 1989-06-07 Kommunedata I S PROCEDURE FOR TRANSFER OF DATA, AN ELECTRONIC DOCUMENT OR SIMILAR, SYSTEM FOR EXERCISING THE PROCEDURE AND A CARD FOR USE IN EXERCISING THE PROCEDURE
JPH0334084A (en) 1989-06-30 1991-02-14 Toshiba Corp Recording device for portable storage medium
DE3927270C2 (en) 1989-08-18 1996-07-11 Deutsche Telekom Ag Process for personalizing chip cards
JP2854636B2 (en) * 1989-11-30 1999-02-03 株式会社東芝 Apparatus and method for issuing portable medium
US5036461A (en) * 1990-05-16 1991-07-30 Elliott John C Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
ATE100229T1 (en) 1990-07-20 1994-01-15 Siemens Nixdorf Inf Syst METHOD OF PREVENTING UNAUTHORIZED DEVIATIONS FROM THE RUN LOG OF AN APPLICATION IN A DATA EXCHANGE SYSTEM.
JPH05314322A (en) 1991-06-11 1993-11-26 Dainippon Printing Co Ltd Ic card issue system
SE468068C (en) 1991-09-30 1994-01-13 Comvik Gsm Ab Procedure for personalization of an active card, for use in a mobile telephone system
US5268963A (en) * 1992-06-09 1993-12-07 Audio Digital Imaging Inc. System for encoding personalized identification for storage on memory storage devices
US6335799B1 (en) * 1993-01-21 2002-01-01 Efunds Corporation Plastic card personalizer system
JP3568970B2 (en) 1993-04-12 2004-09-22 株式会社東芝 IC card issuing device
US5524857A (en) 1993-08-11 1996-06-11 Eisenberg; Ahikam Multi use flag holder apparatus
US5649118A (en) 1993-08-27 1997-07-15 Lucent Technologies Inc. Smart card with multiple charge accounts and product item tables designating the account to debit
AU1839395A (en) * 1994-02-04 1995-08-29 Data Card Corporation Card creation system and method
US5461217A (en) * 1994-02-08 1995-10-24 At&T Ipm Corp. Secure money transfer techniques using smart cards
SE502424C2 (en) 1994-02-17 1995-10-16 Telia Ab Method and device for certificate management systems
JP3545045B2 (en) 1994-05-18 2004-07-21 大日本印刷株式会社 Creating a pattern file for IC card access
JP3369306B2 (en) 1994-05-18 2003-01-20 大日本印刷株式会社 Apparatus for distributing personal information to a system that issues personal information recording media
JP3645587B2 (en) 1994-05-18 2005-05-11 大日本印刷株式会社 IC card access pattern file creation support device
JPH07334631A (en) 1994-06-03 1995-12-22 Dainippon Printing Co Ltd Ic card issue processing system
DE4427163A1 (en) * 1994-08-01 1996-02-08 Abb Management Ag Gas pressure switch
FR2725540B1 (en) 1994-10-07 1997-01-03 Serpeinesm Sa CUSTOMIZATION PROCESS IN SERIES OF CARDS
CA2141756A1 (en) * 1994-12-22 1996-06-23 Pietro De Rosa Personalized individual secured card production device
US5721781A (en) * 1995-09-13 1998-02-24 Microsoft Corporation Authentication system and method for smart card transactions
EP0778553B1 (en) 1995-12-08 2004-07-28 Kabushiki Kaisha Toshiba Portable storage medium issuing system and issuing method
US6038551A (en) * 1996-03-11 2000-03-14 Microsoft Corporation System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
US5889941A (en) 1996-04-15 1999-03-30 Ubiq Inc. System and apparatus for smart card personalization
JP2005243309A (en) 2004-02-24 2005-09-08 Matsushita Electric Works Ltd Lighting fixture

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4772782A (en) * 1984-12-28 1988-09-20 Bull S.A. Method of personalizing portable media such as credit cards
US4874935A (en) * 1986-03-10 1989-10-17 Data Card Coprporation Smart card apparatus and method of programming same
US4882474A (en) * 1986-05-16 1989-11-21 American Telephone And Telegraph Company Security file system and method for securing data in a portable data carrier
US4866259A (en) * 1986-08-08 1989-09-12 Bonnemoy Marc A Equipment for automatic personalizing of credit cards
US4827425A (en) * 1986-10-31 1989-05-02 Thorn Emi Malco, Incorporated System for personalization of integrated circuit microchip cards
US4825054A (en) * 1988-02-16 1989-04-25 Datacard Corporation Method and apparatus for parallel integrated circuit card initialization and embossing
US5025399A (en) * 1988-09-23 1991-06-18 Datacard Corporation Method and apparatus for personalizing plastic cards
US5266781A (en) * 1991-08-15 1993-11-30 Datacard Corporation Modular card processing system
US5534857A (en) * 1991-11-12 1996-07-09 Security Domain Pty. Ltd. Method and system for secure, decentralized personalization of smart cards
US5442165A (en) * 1992-10-15 1995-08-15 Oki Electric Industry Co., Ltd. Secure IC card system with reusable prototype IC card
US5332889A (en) * 1992-12-18 1994-07-26 Datacard Corporation Integrated circuit card programming device
US5378884A (en) * 1992-12-18 1995-01-03 Datacard Corporation Personalization station for programming integrated circuit cards
US5578808A (en) * 1993-12-22 1996-11-26 Datamark Services, Inc. Data card that can be used for transactions involving separate card issuers
US5684742A (en) * 1995-09-20 1997-11-04 International Business Machines Corporation Device and method for the simplified generation of tools for the initialization and personalization of and communication with a chip card

Cited By (311)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5942738A (en) * 1995-05-30 1999-08-24 Syseca S.A. Smart IC card system and smart IC card with transaction management program stored therein
US20030050899A1 (en) * 1996-04-15 2003-03-13 David R. Tushie System and method for smart card personalization
US20070118474A1 (en) * 1996-04-15 2007-05-24 Card Technology Corporation System and apparatus for smart card personalization
US8301300B2 (en) * 1996-04-15 2012-10-30 Card Technology Corporation System and method for smart card personalization
US6014748A (en) * 1996-04-15 2000-01-11 Ubiq Incorporated System and apparatus for smart card personalization
US8600889B2 (en) 1996-05-10 2013-12-03 Transaction Holdings Ltd. Llc Automated transaction machine
US8600887B2 (en) 1996-05-10 2013-12-03 Transaction Holdings Ltd., Llc Automated transaction machine
US7699220B2 (en) 1996-05-10 2010-04-20 Transaction Holdings Ltd., Llc Automated transaction machine
US8571952B2 (en) 1996-05-10 2013-10-29 Transaction Holdings Ltd., Llc Automated transaction machine
US20080065537A1 (en) * 1996-05-10 2008-03-13 Barcelou David M Automated transaction machine
US8560451B2 (en) 1996-05-10 2013-10-15 Transaction Holdings Ltd., Llc Automated transaction machine
US7793830B2 (en) 1996-05-10 2010-09-14 Transaction Holdings Ltd, LLC Automated transaction machine
US8600888B2 (en) 1996-05-10 2013-12-03 Transaction Holdings Ltd., Llc Automated transaction machine
US8132714B2 (en) 1996-05-10 2012-03-13 Transaction Holdings Ltd, L.L.C. Automated transaction machine
US8132715B2 (en) 1996-05-10 2012-03-13 Transaction Holdings Ltd, L.L.C. Automated transaction machine
US8583522B2 (en) 1996-05-10 2013-11-12 Transaction Holdings Ltd., Llc Automated transaction machine
US7837101B2 (en) 1996-05-10 2010-11-23 Transaction Holdings Ltd, L.L.C. Automated transaction machine
US8543507B2 (en) 1996-05-10 2013-09-24 Transactions Holdings Ltd., LLC Automated transaction machine
US8600890B2 (en) 1996-05-10 2013-12-03 Transaction Holdings Ltd., Llc Automated transaction machine
US20080065538A1 (en) * 1996-05-10 2008-03-13 Barcelou David M Automated transaction machine
US7802718B2 (en) 1996-05-10 2010-09-28 Transaction Holdings Ltd, L.L.C. Automated transaction machine
US20080067236A1 (en) * 1996-05-10 2008-03-20 Barcelou David M Automated transaction machine
US8554677B2 (en) 1996-05-10 2013-10-08 Transaction Holdings Ltd., Llc Automated transaction machine
US8726247B2 (en) 1996-10-25 2014-05-13 Gemalto Sa Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
US8881119B2 (en) 1996-10-25 2014-11-04 Gemalto Sa Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
US9400668B2 (en) 1996-10-25 2016-07-26 Gemalto Sa Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
US8881118B2 (en) 1996-10-25 2014-11-04 Gemalto Sa Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
US6308317B1 (en) * 1996-10-25 2001-10-23 Schlumberger Technologies, Inc. Using a high level programming language with a microcontroller
US20110126178A1 (en) * 1996-10-25 2011-05-26 Gemalto Sa Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form
US6202155B1 (en) * 1996-11-22 2001-03-13 Ubiq Incorporated Virtual card personalization system
US5987612A (en) * 1996-12-06 1999-11-16 Nippon Telegraph And Telephone Corporation Internet accessing system using card readers and dual cards with information pertaining to log on
US6575372B1 (en) * 1997-02-21 2003-06-10 Mondex International Limited Secure multi-application IC card system having selective loading and deleting capability
US20070180276A1 (en) * 1997-02-21 2007-08-02 Everett David B Key transformation unit for a tamper resistant module
US7707408B2 (en) 1997-02-21 2010-04-27 Multos Limited Key transformation unit for a tamper resistant module
US20080091957A1 (en) * 1997-02-21 2008-04-17 Everett David B Key transformation unit for a tamper resistant module
US7669055B2 (en) 1997-02-21 2010-02-23 Multos Limited Key transformation unit for a tamper resistant module
US20070255955A1 (en) * 1997-02-21 2007-11-01 Everett David B Tamper resistant module certification authority
US7730311B2 (en) 1997-02-21 2010-06-01 Multos Limited Key transformation unit for a tamper resistant module
US7702908B2 (en) 1997-02-21 2010-04-20 Multos Limited Tamper resistant module certification authority
US20080091956A1 (en) * 1997-02-21 2008-04-17 Everett David B Key transformation unit for a tamper resistant module
US7689826B2 (en) 1997-02-21 2010-03-30 Multos Limited Flexibly loading a tamper resistant module
US6659354B2 (en) 1997-02-21 2003-12-09 Mondex International Limited Secure multi-application IC card system having selective loading and deleting capability
US7730312B2 (en) 1997-02-21 2010-06-01 Multos Limted Tamper resistant module certification authority
US7730310B2 (en) 1997-02-21 2010-06-01 Multos Limited Key transformation unit for a tamper resistant module
US6317832B1 (en) * 1997-02-21 2001-11-13 Mondex International Limited Secure multiple application card system and process
US20080059812A1 (en) * 1997-02-21 2008-03-06 Everett David B Key transformation unit for a tamper resistant module
US7734923B2 (en) 1997-02-21 2010-06-08 Multos Limited Key transformation unit for a tamper resistant module
US20070143616A1 (en) * 1997-02-21 2007-06-21 Everett David B Flexibly loading a tamper resistant module
US20080052515A1 (en) * 1997-02-21 2008-02-28 Everett David B Tamper resistant module certification authority
US6575360B1 (en) * 1997-05-15 2003-06-10 Betaresearch Device and method for personalizing chip cards
US6157966A (en) * 1997-06-30 2000-12-05 Schlumberger Malco, Inc. System and method for an ISO7816 complaint smart card to become master over a terminal
US6283368B1 (en) * 1997-07-29 2001-09-04 Gilles Leroux S.A. High speed customizing machine
US6367011B1 (en) 1997-10-14 2002-04-02 Visa International Service Association Personalization of smart cards
US5969318A (en) * 1997-11-24 1999-10-19 Mackenthun; Holger Gateway apparatus for designing and issuing multiple application cards
US6308270B1 (en) 1998-02-13 2001-10-23 Schlumberger Technologies, Inc. Validating and certifying execution of a software program with a smart card
US6592042B1 (en) * 1998-02-13 2003-07-15 Schlumberger Systemes Method for making a card with integrated circuit
WO1999057675A1 (en) * 1998-05-06 1999-11-11 American Express Travel Related Services Company, Inc. Methods and apparatus for dynamic smartcard synchronization and personalization
US6199762B1 (en) * 1998-05-06 2001-03-13 American Express Travel Related Services Co., Inc. Methods and apparatus for dynamic smartcard synchronization and personalization
US20040256451A1 (en) * 1998-05-11 2004-12-23 Ubiq Incorporated. Smart card personalization in a multistation environment
US7500601B2 (en) 1998-05-11 2009-03-10 Card Technology Corporation Smart card personalization in a multistation environment
US6196459B1 (en) * 1998-05-11 2001-03-06 Ubiq Incorporated Smart card personalization in a multistation environment
US6453414B1 (en) 1998-07-23 2002-09-17 Samsung Electronics Co., Ltd. Computer system with PC cards and method of booting the same
US6632250B1 (en) * 1998-09-11 2003-10-14 Datacard Corporation Method and system for creating a card
US6591229B1 (en) 1998-10-09 2003-07-08 Schlumberger Industries, Sa Metrology device with programmable smart card
US6786418B1 (en) * 1998-11-05 2004-09-07 Gemplus Smart card customizing system
US6402028B1 (en) 1999-04-06 2002-06-11 Visa International Service Association Integrated production of smart cards
US20020180993A1 (en) * 1999-05-07 2002-12-05 Klinefelter Gary M. Identification card printer having multiple controllers
US6796494B1 (en) 1999-06-18 2004-09-28 Steven M. Gonzalo Method and system for configuring a publicly accessible computer system
WO2001001622A3 (en) * 1999-06-28 2001-07-26 Starpay Com Inc Apparatus and method for performing secure network transactions
WO2001001622A2 (en) * 1999-06-28 2001-01-04 Starpay.Com, Inc. Apparatus and method for performing secure network transactions
US7020872B1 (en) * 1999-07-01 2006-03-28 Cp8 Technologies Method for verifying code transformers for an incorporated system, in particular in a chip card
US6971025B1 (en) * 1999-08-19 2005-11-29 International Business Machines Corporation Secure personalization of chip cards
US8924310B2 (en) 1999-08-31 2014-12-30 Lead Core Fund, L.L.C. Methods and apparatus for conducting electronic transactions
US20110191250A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US9519894B2 (en) 1999-08-31 2016-12-13 Gula Consulting Limited Liability Company Methods and apparatus for conducting electronic transactions
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US20100312667A1 (en) * 1999-08-31 2010-12-09 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7505941B2 (en) 1999-08-31 2009-03-17 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions using biometrics
US8214299B2 (en) 1999-08-31 2012-07-03 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US8433658B2 (en) 1999-08-31 2013-04-30 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US8938402B2 (en) 1999-08-31 2015-01-20 Lead Core Fund, L.L.C. Methods and apparatus for conducting electronic transactions
US20110191249A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US20110191248A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US8423476B2 (en) 1999-08-31 2013-04-16 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US8489513B2 (en) 1999-08-31 2013-07-16 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US20050139650A1 (en) * 1999-09-20 2005-06-30 Gonzalo Steven M. Method and system for configuring a publicly accessible computer system
DE19958559A1 (en) * 1999-12-04 2001-06-07 Orga Kartensysteme Gmbh Method for initializing and / or personalizing chip cards and a corresponding device
GB2358500A (en) * 2000-01-19 2001-07-25 Softcard Solutions Ltd Programming data carriers
US7588180B1 (en) 2000-01-28 2009-09-15 International Apparel Group, Llc Multi-application smart card with currency exchange, location tracking, and personal identification capabilities
US9213976B2 (en) 2000-01-28 2015-12-15 Ubiquity Broadcasting Corporation Multi application smartcard with currency exchange, location, tracking and personal identification capabilities
US20110178928A1 (en) * 2000-01-28 2011-07-21 International Apparel Group, Llc Multi Application Smartcard with Currency Exchange, Location, Tracking and Personal Identification Capabilities
US8479981B2 (en) 2000-01-28 2013-07-09 Ubiquity Broadcasting Corporation Multi application smartcard with currency exchange, location, tracking and personal identification capabilities
US6588673B1 (en) * 2000-02-08 2003-07-08 Mist Inc. Method and system providing in-line pre-production data preparation and personalization solutions for smart cards
US8949608B2 (en) * 2000-02-18 2015-02-03 Vasco Data Security, Inc. Field programmable smart card terminal and token device
US9710635B2 (en) 2000-02-18 2017-07-18 Vasco Data Security, Inc. Field programmable smart card terminal and token device
US20010054148A1 (en) * 2000-02-18 2001-12-20 Frank Hoornaert Field programmable smart card terminal and token device
US7092935B2 (en) * 2000-02-25 2006-08-15 Canon Kabushiki Kaisha Customizable filter interface
US6715078B1 (en) 2000-03-28 2004-03-30 Ncr Corporation Methods and apparatus for secure personal identification number and data encryption
WO2001078020A1 (en) 2000-04-11 2001-10-18 Visa International Service Association Integrated production of smart cards
US20020004767A1 (en) * 2000-07-06 2002-01-10 Chikashi Okamoto Identification code management method and management system
US20050251678A1 (en) * 2000-07-06 2005-11-10 Chikashi Okamoto Identification code management method and management system
EP1170694A3 (en) * 2000-07-06 2004-11-17 Hitachi, Ltd. Identification code management method and system
US7178026B2 (en) 2000-07-06 2007-02-13 Hitachi, Ltd. Identification code management method and management system
EP1170694A2 (en) * 2000-07-06 2002-01-09 Hitachi, Ltd. Identification code management method and system
US6934842B2 (en) 2000-07-06 2005-08-23 Hitachi, Ltd. Identification code management method and management system
US20070133795A1 (en) * 2000-07-21 2007-06-14 Kahn Raynold M Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
US7480381B2 (en) 2000-07-21 2009-01-20 The Directv Group, Inc. Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
US7203311B1 (en) 2000-07-21 2007-04-10 The Directv Group, Inc. Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
US20070118770A1 (en) * 2000-07-21 2007-05-24 Kahn Raynold M Secure storage and replay of media programs using a hard-paired receiver and storage device
WO2002015077A1 (en) * 2000-08-14 2002-02-21 Starpay.Com, Inc. Apparatus and method for performing secure network transactions
US20040015612A1 (en) * 2000-09-05 2004-01-22 Sven Gossel Method for producing chips, especially for sim cards, in a series
US20020165906A1 (en) * 2000-09-14 2002-11-07 Glenn Ricart Method and system for computer personalization
US6513721B1 (en) * 2000-11-27 2003-02-04 Microsoft Corporation Methods and arrangements for configuring portable security token features and contents
US20020129261A1 (en) * 2001-03-08 2002-09-12 Cromer Daryl Carvis Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens
US20020138759A1 (en) * 2001-03-26 2002-09-26 International Business Machines Corporation System and method for secure delivery of a parcel or document
US20040144838A1 (en) * 2001-04-10 2004-07-29 Laurent Lagosanto Method and system for managing data designed to be stored in a programmable smart card
US7025261B2 (en) * 2001-04-10 2006-04-11 Gemplus Method and system for managing data designed to be stored in a programmable smart card
US7050830B2 (en) * 2001-04-17 2006-05-23 Thomson Licensing System with IC card deactivation
US20020151330A1 (en) * 2001-04-17 2002-10-17 Claude Fouque System with IC card deactivation before a hardware reset
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US6834795B1 (en) * 2001-06-29 2004-12-28 Sun Microsystems, Inc. Secure user authentication to computing resource via smart card
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US9336634B2 (en) 2001-07-10 2016-05-10 Chartoleaux Kg Limited Liability Company Hand geometry biometrics on a payment device
US8284025B2 (en) 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
USRE45416E1 (en) 2001-07-10 2015-03-17 Xatra Fund Mx, Llc Processing an RF transaction using a routing number
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US9196110B2 (en) 2001-07-10 2015-11-24 Iii Holdings 1, Llc System and method for dynamic FOB synchronization and personalization
US7886157B2 (en) 2001-07-10 2011-02-08 Xatra Fund Mx, Llc Hand geometry recognition biometrics on a fob
US7988038B2 (en) 2001-07-10 2011-08-02 Xatra Fund Mx, Llc System for biometric security using a fob
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US7814332B2 (en) 2001-07-10 2010-10-12 Blayn W Beenau Voiceprint biometrics on a payment device
US20100257099A1 (en) * 2001-07-10 2010-10-07 American Express Travel Related Services Company, Inc. System and method for dynamic fob synchronization and personalization
US8074889B2 (en) 2001-07-10 2011-12-13 Xatra Fund Mx, Llc System for biometric security using a fob
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US8289136B2 (en) 2001-07-10 2012-10-16 Xatra Fund Mx, Llc Hand geometry biometrics on a payment device
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7690577B2 (en) 2001-07-10 2010-04-06 Blayn W Beenau Registering a biometric for radio frequency transactions
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US10839388B2 (en) 2001-07-10 2020-11-17 Liberty Peak Ventures, Llc Funding a radio frequency device transaction
US20050160281A1 (en) * 2001-07-25 2005-07-21 Seagate Technology Llc System and method for delivering versatile security, digital rights management, and privacy services
US7925894B2 (en) 2001-07-25 2011-04-12 Seagate Technology Llc System and method for delivering versatile security, digital rights management, and privacy services
US20060174352A1 (en) * 2001-07-25 2006-08-03 Seagate Technology Llc Method and apparatus for providing versatile services on storage devices
US20080279386A1 (en) * 2001-09-21 2008-11-13 The Directv Group, Inc. Method and apparatus for encrypting media programs for later purchase and viewing
US8677152B2 (en) 2001-09-21 2014-03-18 The Directv Group, Inc. Method and apparatus for encrypting media programs for later purchase and viewing
US7409562B2 (en) 2001-09-21 2008-08-05 The Directv Group, Inc. Method and apparatus for encrypting media programs for later purchase and viewing
US7786846B2 (en) * 2001-12-17 2010-08-31 Nxp B.V. Communication station for inventorizing transponders by means of selectable memory areas of the transponders
WO2003052673A1 (en) * 2001-12-17 2003-06-26 Koninklijke Philips Electronics N.V. Communication station for inventorizing transponders by means of selectable memory areas of the transponders
US20060097851A1 (en) * 2001-12-17 2006-05-11 Franz Amtmann Communication station for inventorizing transponders by means of selectable memory areas of the transponders
CN1327382C (en) * 2001-12-17 2007-07-18 皇家飞利浦电子股份有限公司 Communication station for inventorizing transponders by means of selectable memory areas of the transponders
US6995651B2 (en) 2001-12-17 2006-02-07 Koninklijke Phillips Electronics N.V. Communication station for inventorizing transponders by means of selectable memory areas of the transponders
US20070007720A1 (en) * 2002-01-28 2007-01-11 Datacard Corporation Card personalization system and method for the same
US6902107B2 (en) * 2002-01-28 2005-06-07 Datacard Corporation Card personalization system and method
US20030201317A1 (en) * 2002-01-28 2003-10-30 Brian Shay Card personalization system and method
US7458515B2 (en) 2002-01-28 2008-12-02 Datacard Corporation Card personalization system and method for the same
US6662999B1 (en) * 2002-02-26 2003-12-16 Connecticut General Life Insurance, Co. System and method for generating an identification card
US20030216826A1 (en) * 2002-03-01 2003-11-20 Fargo Electronics, Inc. Identification card manufacturing security
US20060037065A1 (en) * 2002-03-01 2006-02-16 Fargo Electronics, Inc. Prevention of unauthorized credential production in a credential production system
US20080316523A1 (en) * 2002-03-01 2008-12-25 Fargo Electronics, Inc. Identification card manufacturing security
US7793353B2 (en) 2002-03-01 2010-09-07 Hid Global Corporation Identification card manufacturing security
US7430762B2 (en) 2002-03-01 2008-09-30 Fargo Electronics, Inc. Identification card manufacturing security
US9572679B2 (en) * 2002-04-23 2017-02-21 Spinecore, Inc. Artificial disc replacements with natural kinematics
US10299933B2 (en) 2002-04-23 2019-05-28 Spinecore, Inc. Artificial disc replacements with natural kinematics
US9877841B2 (en) 2002-04-23 2018-01-30 Spinecore, Inc. Artificial disc replacements with natural kinematics
US20160030193A1 (en) * 2002-04-23 2016-02-04 Spinecore, Inc. Artificial disc replacements with natural kinematics
US20040015379A1 (en) * 2002-05-31 2004-01-22 David Mee Raising an alert
USRE43157E1 (en) 2002-09-12 2012-02-07 Xatra Fund Mx, Llc System and method for reassociating an account number to another transaction account
US20050006460A1 (en) * 2002-09-20 2005-01-13 Datacard Corporation Remote personalization and issuance of identity documents
US7147148B2 (en) 2002-09-20 2006-12-12 Ruediger Guenter Kreuter Remote personalization and issuance of identity documents
US20040160624A1 (en) * 2003-02-18 2004-08-19 Adam Elgar Apparatus and method for manipulating images
US8269793B2 (en) 2003-02-18 2012-09-18 Serverside Group Limited Apparatus and method for manipulating images
US7946490B2 (en) 2003-02-18 2011-05-24 Serverside Group Limited Computerized card production equipment
US9934503B2 (en) 2003-02-18 2018-04-03 Gemalto Sa Apparatus and method for manipulating images
US20080230616A1 (en) * 2003-02-18 2008-09-25 Serverside Group Limited Computerized Card Production Equipment
US20070156837A1 (en) * 2003-02-18 2007-07-05 Adam Elgar Apparatus and method for manipulating images
US7931199B2 (en) 2003-02-18 2011-04-26 Serverside Group Limited Computerized card production equipment
US20110144793A1 (en) * 2003-02-18 2011-06-16 Serverside Group Limited Computerized Card Production Equipment
US20110072988A1 (en) * 2003-02-18 2011-03-31 Serverside Group Limited Computerized Card Production Equipment
WO2004095382A1 (en) * 2003-04-21 2004-11-04 Visa International Service Association Smart card personalization assistance tool
US8589335B2 (en) 2003-04-21 2013-11-19 Visa International Service Association Smart card personalization assistance tool
US20040210566A1 (en) * 2003-04-21 2004-10-21 Visa International Service Association Smart card personalization assistance tool
US8856063B2 (en) 2003-04-21 2014-10-07 Visa International Service Association Smart device personalization assistance tool
AU2004232121B2 (en) * 2003-04-21 2010-11-04 Visa International Service Association Smart card personalization assistance tool
US9959544B2 (en) * 2003-05-22 2018-05-01 International Business Machines Corporation Updating an application on a smart card and displaying an advertisement
US20040236624A1 (en) * 2003-05-22 2004-11-25 International Business Machines Corporation Method and apparatus for targeted marketing in embedded chip post issuance transactions
US7487920B2 (en) * 2003-12-19 2009-02-10 Hitachi, Ltd. Integrated circuit card system and application loading method
US20050137737A1 (en) * 2003-12-19 2005-06-23 Akiko Sato Integrated circuit card system and application loading method
US20050167487A1 (en) * 2004-02-02 2005-08-04 Conlon Jennifer L. System and method for customizing designs for credit cards, ATM/debit cards, checks, gift cards, and membership cards
US20070246526A1 (en) * 2004-02-17 2007-10-25 Serverside Group Limited Apparatus and Method for Production of Transaction Cards
US20110210980A1 (en) * 2004-02-17 2011-09-01 Serverside Group Limited Apparatus and method for production of transaction cards
US8544731B2 (en) 2004-02-17 2013-10-01 Serverside Group Limited Apparatus and method for production of transaction cards
US20080313205A1 (en) * 2004-03-29 2008-12-18 Serverside Group Limited Card Design System
US7290146B2 (en) * 2004-05-03 2007-10-30 Fargo Electronics, Inc. Managed credential issuance
US20050257253A1 (en) * 2004-05-03 2005-11-17 Fargo Electronics, Inc Managed credential issuance
US20060074718A1 (en) * 2004-05-20 2006-04-06 Idexx Laboratories, Inc. Portable veterinary medical record apparatus and method of use
US7530493B2 (en) 2004-07-01 2009-05-12 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using iris scan recognition
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US20060000892A1 (en) * 2004-07-01 2006-01-05 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US20060016870A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US20060016877A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Biometric safeguard method with a smartcard
US7314165B2 (en) 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US7793845B2 (en) 2004-07-01 2010-09-14 American Express Travel Related Services Company, Inc. Smartcard transaction system and method
US7314164B2 (en) 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US20080006691A1 (en) * 2004-07-01 2008-01-10 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US20080013796A1 (en) * 2004-07-01 2008-01-17 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7325724B2 (en) 2004-07-01 2008-02-05 American Express Travel Related Services Company, Inc. Method for registering a biometric for use with a smartcard
US7341181B2 (en) 2004-07-01 2008-03-11 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US8016191B2 (en) 2004-07-01 2011-09-13 American Express Travel Related Services Company, Inc. Smartcard transaction system and method
US20080067242A1 (en) * 2004-07-01 2008-03-20 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US20080072065A1 (en) * 2004-07-01 2008-03-20 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US7597265B2 (en) 2004-07-01 2009-10-06 American Express Travel Related Services Company, Inc. Method and system for vascular scan recognition with a smartcard
US7363504B2 (en) 2004-07-01 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for keystroke scan recognition biometrics on a smartcard
US7438234B2 (en) 2004-07-01 2008-10-21 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7594612B2 (en) 2004-07-01 2009-09-29 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using retinal scan recognition
US7445149B2 (en) 2004-07-01 2008-11-04 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7451925B2 (en) 2004-07-01 2008-11-18 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7533827B2 (en) 2004-07-01 2009-05-19 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using signature recognition
US7451924B2 (en) 2004-07-01 2008-11-18 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7497375B2 (en) 2004-07-01 2009-03-03 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using smellprint recognition
US7523860B2 (en) 2004-07-01 2009-04-28 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using facial scan recognition
US7506806B2 (en) 2004-07-01 2009-03-24 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using fingerprint recognition
US7510115B2 (en) 2004-07-01 2009-03-31 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using auditory scan recognition
US20060074713A1 (en) * 2004-10-04 2006-04-06 Conry Anne M Patient identification card system and method for efficient medical care
US7387233B2 (en) * 2004-12-14 2008-06-17 Renesas Technology Corp. RFID card issuing system
US20080237344A1 (en) * 2004-12-14 2008-10-02 Toshimichi Masuta Rfid card issuing system
US20070251993A1 (en) * 2004-12-14 2007-11-01 Toshimichi Masuta Rfid Card Issuing System
US7232073B1 (en) * 2004-12-21 2007-06-19 Sun Microsystems, Inc. Smart card with multiple applications
US7801883B2 (en) * 2005-01-19 2010-09-21 Samsung Electronics Co., Ltd. Method and apparatus for improving data processing speed through storage of record information of identity module
US20060161594A1 (en) * 2005-01-19 2006-07-20 Samsung Electronics Co., Ltd. Method and apparatus for improving data processing speed through storage of record information of identity module
US20070187516A1 (en) * 2005-06-20 2007-08-16 Rotuba Extruders, Inc. Scented authorization card and method of manufacture
US20070036516A1 (en) * 2005-08-11 2007-02-15 The Directtv Group, Inc. Secure delivery of program content via a removable storage medium
US9325944B2 (en) 2005-08-11 2016-04-26 The Directv Group, Inc. Secure delivery of program content via a removable storage medium
US20070043684A1 (en) * 2005-08-18 2007-02-22 Fargo Electronics, Inc. Central Management of a Credential Production System
US8099187B2 (en) 2005-08-18 2012-01-17 Hid Global Corporation Securely processing and tracking consumable supplies and consumable material
WO2007044259A3 (en) * 2005-10-04 2009-04-16 First Data Corp Systems and methods for personalizing transaction cards
US20070118479A1 (en) * 2005-11-18 2007-05-24 Xerox Corporation System and method for controlling access to personal identification information contained in documents
US8903744B2 (en) * 2005-11-18 2014-12-02 Xerox Corporation System and method for controlling access to personal identification information contained in documents
US20080005559A1 (en) * 2006-04-19 2008-01-03 Stepnexus Holdings Methods and systems for ic card application loading
US8429724B2 (en) 2006-04-25 2013-04-23 Seagate Technology Llc Versatile access control system
US20070250710A1 (en) * 2006-04-25 2007-10-25 Seagate Technology Llc Versatile secure and non-secure messaging
US20090235109A1 (en) * 2006-04-25 2009-09-17 Seagate Technology Llc Hybrid computer security clock
US20070250915A1 (en) * 2006-04-25 2007-10-25 Seagate Technology Llc Versatile access control system
US8028166B2 (en) 2006-04-25 2011-09-27 Seagate Technology Llc Versatile secure and non-secure messaging
US8281178B2 (en) 2006-04-25 2012-10-02 Seagate Technology Llc Hybrid computer security clock
US7992175B2 (en) 2006-05-15 2011-08-02 The Directv Group, Inc. Methods and apparatus to provide content on demand in content broadcast systems
US8775319B2 (en) 2006-05-15 2014-07-08 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US10977631B2 (en) 2006-05-15 2021-04-13 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US20070265973A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to protect content in home networks
US8001565B2 (en) 2006-05-15 2011-08-16 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems
US9967521B2 (en) 2006-05-15 2018-05-08 The Directv Group, Inc. Methods and apparatus to provide content on demand in content broadcast systems
US20070265966A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Content delivery systems and methods to operate the same
US20070266414A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to provide content on demand in content broadcast systems
US20070265967A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems
US8996421B2 (en) 2006-05-15 2015-03-31 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems
US8095466B2 (en) 2006-05-15 2012-01-10 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems
US20070265970A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems
US20070265978A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US20070265968A1 (en) * 2006-05-15 2007-11-15 The Directv Group, Inc. Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems
US20080126398A1 (en) * 2006-06-29 2008-05-29 Incard S.A. Method for Configuring an IC Card in Order to Receive Personalization Commands
US8244762B2 (en) * 2006-06-29 2012-08-14 Incard S.A. Method for configuring an IC card in order to receive personalization commands
US9178693B2 (en) 2006-08-04 2015-11-03 The Directv Group, Inc. Distributed media-protection systems and methods to operate the same
US9225761B2 (en) 2006-08-04 2015-12-29 The Directv Group, Inc. Distributed media-aggregation systems and methods to operate the same
US8527354B2 (en) 2006-08-08 2013-09-03 Serverside Group Limited Affinity group
US20080037900A1 (en) * 2006-08-08 2008-02-14 Serverside Group Limited Affinity group
US20090235037A1 (en) * 2006-11-07 2009-09-17 Oberthur Technologies Method and device for customizing a portable electronic entity
US8424770B2 (en) * 2006-11-07 2013-04-23 Oberthur Technologies Method and device for customizing a portable electronic entity
US20080265020A1 (en) * 2007-02-09 2008-10-30 Business Intelligent Processing Systems Plc System and method for performing payment transactions, verifying age, verifying identity, and managing taxes
US20100058365A1 (en) * 2007-02-14 2010-03-04 Datacard Corporation Framework for enhanced production of personalized documents
US8381236B2 (en) 2007-02-14 2013-02-19 Datacard Corporation Framework for enhanced production of personalized documents
US20080301461A1 (en) * 2007-05-31 2008-12-04 Vasco Data Security International, Inc. Remote authentication and transaction signatures
US7930554B2 (en) 2007-05-31 2011-04-19 Vasco Data Security,Inc. Remote authentication and transaction signatures
US8667285B2 (en) 2007-05-31 2014-03-04 Vasco Data Security, Inc. Remote authentication and transaction signatures
US11049372B2 (en) 2007-06-13 2021-06-29 CPI Card Group—Colorado, Inc. System and methods for generating user interfaces for custom card design session
US7992774B2 (en) * 2007-06-13 2011-08-09 Image Asset Management Inc. System and methods for creating a user customized bank card
US20080308636A1 (en) * 2007-06-13 2008-12-18 William Lynch System and methods for creating a user customized bank card
US9697555B2 (en) 2007-06-13 2017-07-04 CPI Card Group—Colorado, Inc. Systems and methods for creating a user customized bank card
US8292167B2 (en) 2007-08-01 2012-10-23 Datacard Corporation Real time card printing systems and methods
US8056816B2 (en) 2007-08-01 2011-11-15 Datacard Corporation Real time card printing systems and methods
US20110000386A1 (en) * 2007-08-01 2011-01-06 Dynamic Solutions International Real time card printing systems and methods
AU2009233913B2 (en) * 2008-04-09 2012-07-26 Visa U.S.A. Inc. Customer exclusive data
US20090259578A1 (en) * 2008-04-09 2009-10-15 Visa U.S.A. Inc. Customer exclusive data
WO2009126630A1 (en) * 2008-04-09 2009-10-15 Visa U.S.A. Inc. Customer exclusive data
US20100325039A1 (en) * 2009-04-28 2010-12-23 Mastercard International Incorporated Apparatus, method, and computer program product for encoding enhanced issuer information in a card
US8401964B2 (en) * 2009-04-28 2013-03-19 Mastercard International Incorporated Apparatus, method, and computer program product for encoding enhanced issuer information in a card
US8397376B2 (en) 2010-08-26 2013-03-19 CPI Card Group—Colorado, Inc. System for automated production processing of smart cards
US10353645B2 (en) 2011-07-01 2019-07-16 Entrust Datacard Corporation User interface for a customized personalization document printer of an instant issuance system
US10656880B2 (en) 2011-07-01 2020-05-19 Entrust Datacard Corporation User interface for a customized personalization document printer of an instant issuance system
EP2555174A1 (en) 2011-08-04 2013-02-06 Giesecke & Devrient GmbH Method and system for issuing portable data carriers
US8888007B2 (en) 2011-08-04 2014-11-18 Giesecke & Devrient Gmbh Method and system for issuing portable data carriers
AP3963A (en) * 2011-09-14 2016-12-24 Infosys Ltd A method and system for securing data on a financial transaction instrument
US20150039492A1 (en) * 2013-07-31 2015-02-05 Mastercard International Incorporated Change on card method and apparatus
US10121131B2 (en) * 2013-07-31 2018-11-06 Mastercard International Incorporated Change on card method and apparatus
WO2015047192A1 (en) * 2013-09-24 2015-04-02 Mastercard Asia Pacific Pte. Ltd. A method for electrically personalizing a payment chip and a payment chip
US10395227B2 (en) 2015-01-14 2019-08-27 Tactilis Pte. Limited System and method for reconciling electronic transaction records for enhanced security
US9607189B2 (en) 2015-01-14 2017-03-28 Tactilis Sdn Bhd Smart card system comprising a card and a carrier
US10275768B2 (en) 2015-01-14 2019-04-30 Tactilis Pte. Limited System and method for selectively initiating biometric authentication for enhanced security of financial transactions
US10229408B2 (en) 2015-01-14 2019-03-12 Tactilis Pte. Limited System and method for selectively initiating biometric authentication for enhanced security of access control transactions
US10223555B2 (en) 2015-01-14 2019-03-05 Tactilis Pte. Limited Smart card systems comprising a card and a carrier
US10147091B2 (en) 2015-01-14 2018-12-04 Tactilis Sdn Bhd Smart card systems and methods utilizing multiple ATR messages
US10037528B2 (en) 2015-01-14 2018-07-31 Tactilis Sdn Bhd Biometric device utilizing finger sequence for authentication
US10284528B2 (en) 2015-06-25 2019-05-07 Entrust Datacard Corporation Remote monitoring and management of an instant issuance system
US10560438B2 (en) 2015-06-25 2020-02-11 Entrust Datacard Corporation Remote monitoring and management of an instant issuance system
US10917393B2 (en) 2015-06-25 2021-02-09 Entrust Corporation Remote monitoring and management of an instant issuance system
US20180130049A1 (en) * 2016-11-08 2018-05-10 Jason Michael Busch Card with information features and methods of making the same
US20190197525A1 (en) * 2017-12-21 2019-06-27 Entrust Datacard Corporation Secure end-to-end personalization of smart cards
CN111801671A (en) * 2017-12-21 2020-10-20 恩图鲁斯特咨询卡有限公司 Secure end-to-end personalization of smart cards
US11354650B2 (en) 2019-12-16 2022-06-07 Mastercard International Incorporated Payment card asset construction service

Also Published As

Publication number Publication date
PT1333408E (en) 2007-01-31
ES2195139T3 (en) 2003-12-01
IL126583A0 (en) 1999-08-17
ES2272885T3 (en) 2007-05-01
DE69720201D1 (en) 2003-04-30
JP2000508794A (en) 2000-07-11
NO984821D0 (en) 1998-10-15
CN1187709C (en) 2005-02-02
CN1222988A (en) 1999-07-14
CA2251689A1 (en) 1997-10-23
DE69720201T2 (en) 2004-02-05
CA2251689C (en) 2007-09-18
US20110166999A1 (en) 2011-07-07
HK1021424A1 (en) 2000-06-09
JP2010049711A (en) 2010-03-04
BR9708673A (en) 2000-01-04
NO984821L (en) 1998-12-15
AU717870B2 (en) 2000-04-06
EP0894312B1 (en) 2003-03-26
US20030050899A1 (en) 2003-03-13
EP0894312A1 (en) 1999-02-03
NO330751B1 (en) 2011-07-04
PT894312E (en) 2003-08-29
NZ332406A (en) 2001-01-26
US8301300B2 (en) 2012-10-30
IL126583A (en) 2002-02-10
AU2729897A (en) 1997-11-07
JP2006072998A (en) 2006-03-16
WO1997039424A1 (en) 1997-10-23
ATE341052T1 (en) 2006-10-15
US6014748A (en) 2000-01-11
US20070118474A1 (en) 2007-05-24
ATE235719T1 (en) 2003-04-15
DE69736752T2 (en) 2007-02-01
DK0894312T3 (en) 2003-07-21
EP0894312A4 (en) 1999-09-01
DE69736752D1 (en) 2006-11-09

Similar Documents

Publication Publication Date Title
US5889941A (en) System and apparatus for smart card personalization
US6612486B2 (en) Smart card managing system
US7500601B2 (en) Smart card personalization in a multistation environment
US6588673B1 (en) Method and system providing in-line pre-production data preparation and personalization solutions for smart cards
US9196110B2 (en) System and method for dynamic FOB synchronization and personalization
US6729549B2 (en) System and method for personalization of smart cards
EP1762988A1 (en) System and apparatus for smart card personalization
EP1333408B1 (en) System and apparatus for smart card personalization
KR100508351B1 (en) System and apparatus for smart card personalization
RU2260849C2 (en) System and device for personalization of intellectual cards
CN108197690A (en) payment card, billing system and billing method
AU2010241355B2 (en) Smart card personalization in a multistation environment

Legal Events

Date Code Title Description
AS Assignment

Owner name: UBIQ INC., MINNESOTA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TUSHIE, DAVID R.;HAEUSER, WILLIAM W.;REEL/FRAME:008318/0343

Effective date: 19961122

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
AS Assignment

Owner name: NBS UBIQ INC., MINNESOTA

Free format text: MERGER;ASSIGNOR:UBIQ INCORPORATED;REEL/FRAME:017164/0271

Effective date: 20040830

Owner name: CARD TECHNOLOGY CORPORATION, NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NBS UBIQ INC.;REEL/FRAME:017164/0273

Effective date: 20051027

FPAY Fee payment

Year of fee payment: 8

XAS Not any more in us assignment database

Free format text: LIS PENDENS;ASSIGNOR:STEARNS, JOHN;REEL/FRAME:018654/0501

RR Request for reexamination filed

Effective date: 20070319

FPAY Fee payment

Year of fee payment: 12

B1 Reexamination certificate first reexamination

Free format text: THE PATENTABILITY OF CLAIMS 25 AND 26 IS CONFIRMED. CLAIM 24 IS CANCELLED. NEW CLAIMS 27-47 ARE ADDED AND DETERMINED TO BE PATENTABLE. CLAIMS 1-23 WERE NOT REEXAMINED.

AS Assignment

Owner name: DATACARD CORPORATION, MINNESOTA

Free format text: SECURITY AGREEMENT;ASSIGNORS:NBS TECHNOLOGIES, INC.;CARD TECHNOLOGY CORPORATION;NBS TECHNOLOGIES (US), INC.;REEL/FRAME:026596/0824

Effective date: 20110712

Owner name: DATACARD CORPORATION, MINNESOTA

Free format text: LICENSE;ASSIGNORS:NBS TECHNOLOGIES, INC.;CARD TECHNOLOGY CORPORATION;NBS TECHNOLOGIES (US), INC.;REEL/FRAME:026596/0671

Effective date: 20110712